CN108701197A - 高效的秘密密钥加密的安全切片 - Google Patents
高效的秘密密钥加密的安全切片 Download PDFInfo
- Publication number
- CN108701197A CN108701197A CN201780008333.0A CN201780008333A CN108701197A CN 108701197 A CN108701197 A CN 108701197A CN 201780008333 A CN201780008333 A CN 201780008333A CN 108701197 A CN108701197 A CN 108701197A
- Authority
- CN
- China
- Prior art keywords
- data
- random key
- coded data
- key
- generate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0781—Error filtering or prioritizing based on a policy defined by the user or on a policy defined by a hardware/software module, e.g. according to a severity level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1076—Parity data used in redundant arrays of independent storages, e.g. in RAID systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0709—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0727—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a storage system, e.g. in a DASD or network based storage system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0751—Error or fault detection not based on redundancy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/079—Root cause analysis, i.e. error or fault diagnosis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0793—Remedial or corrective actions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1451—Management of the data involved in backup or backup restore by selection of backup contents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2094—Redundant storage or storage space
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3034—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a storage system, e.g. DASD based or network based
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3055—Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/327—Alarm or error message display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/40—Bus structure
- G06F13/4004—Coupling between buses
- G06F13/4022—Coupling between buses using switching circuits, e.g. switching matrix, connection or expansion network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F13/00—Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
- G06F13/38—Information transfer, e.g. on bus
- G06F13/42—Bus transfer protocol, e.g. handshake; Synchronisation
- G06F13/4282—Bus transfer protocol, e.g. handshake; Synchronisation on a serial bus, e.g. I2C bus, SPI bus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0604—Improving or facilitating administration, e.g. storage management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0604—Improving or facilitating administration, e.g. storage management
- G06F3/0605—Improving or facilitating administration, e.g. storage management by facilitating the interaction with a user or administrator
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/062—Securing storage systems
- G06F3/0623—Securing storage systems in relation to content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0629—Configuration or reconfiguration of storage systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/064—Management of blocks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0638—Organizing or formatting or addressing of data
- G06F3/0644—Management of space entities, e.g. partitions, extents, pools
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0653—Monitoring storage devices or systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0655—Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
- G06F3/0659—Command handling arrangements, e.g. command buffers, queues, command scheduling
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F30/00—Computer-aided design [CAD]
- G06F30/20—Design optimisation, verification or simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
- G06N3/084—Backpropagation, e.g. using gradient descent
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/10—Interfaces, programming languages or software development kits, e.g. for simulating neural networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
- G06Q10/063116—Schedule adjustment for a person or group
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06316—Sequencing of tasks or work
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/20—Administration of product repair or maintenance
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/13—Linear codes
- H03M13/15—Cyclic codes, i.e. cyclic shifts of codewords produce other codewords, e.g. codes defined by a generator polynomial, Bose-Chaudhuri-Hocquenghem [BCH] codes
- H03M13/151—Cyclic codes, i.e. cyclic shifts of codewords produce other codewords, e.g. codes defined by a generator polynomial, Bose-Chaudhuri-Hocquenghem [BCH] codes using error location or error correction polynomials
- H03M13/1515—Reed-Solomon codes
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/29—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
- H03M13/2906—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes using block codes
- H03M13/2909—Product codes
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/37—Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35
- H03M13/3761—Decoding methods or techniques, not specific to the particular type of coding provided for in groups H03M13/03 - H03M13/35 using code combining, i.e. using combining of codeword portions which may have been transmitted separately, e.g. Digital Fountain codes, Raptor codes or Luby Transform [LT] codes
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/61—Aspects and characteristics of methods and arrangements for error correction or error detection, not provided for otherwise
- H03M13/615—Use of computational or mathematical techniques
- H03M13/616—Matrix operations, especially for generator matrices or check matrices, e.g. column or row permutations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/84—Using snapshots, i.e. a logical point-in-time copy of the data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/067—Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
Abstract
加密模块(84)使用随机密钥(102)加密起始数据(82)以产生加密数据(85)。哈希模块(86)使用秘密密钥(98)对加密数据(85)执行安全哈希函数以产生哈希值(104)。处理电路(106)使用哈希值(104)屏蔽随机密钥(102)以产生被屏蔽的随机密钥(108),并组合加密的数据(85)和被屏蔽的随机密钥(108)以产生安全包(96)。分布式存储和任务模块(88)对安全包(96)进行编码以产生编码数据切片组。包括在编码数据切片组中的编码数据切片的秘密密钥(98)和解码阈值数足以恢复安全包(96)和起始数据(82)。编码数据切片组存储在存储单元(22)组中。
Description
技术领域
本发明一般涉及计算机网络,更具体地说,涉及分散错误编码数据。
背景技术
众所周知可以用计算设备传送数据,处理数据和/或存储数据。这样的计算设备包括无线智能电话,笔记本电脑,平板电脑,个人计算机(PC),工作站和视频游戏设备,以及每天支持数百万网络搜索,股票交易或在线购买的数据中心。通常,计算设备包括中央处理单元(CPU),存储器系统,用户输入/输出接口,外围设备接口和互连总线结构。
如进一步已知的,计算机可以通过使用“云计算”代表计算机执行一个或多个计算功能(例如,服务,应用,算法,算术逻辑功能等)来有效地扩展其CPU。此外,对于大型服务,应用和/或功能,云计算可以由分布式方式由多个云计算资源执行,以改善完成服务,应用和/或功能的响应时间。例如,Hadoop是一个开源软件框架,支持分布式应用程序,使数千台计算机能够执行应用程序。
除了云计算之外,计算机可以使用“云存储”作为其存储系统的一部分。众所周知,云存储使用户能够通过其计算机在因特网存储系统上存储文件,应用程序等。因特网存储系统可以包括RAID(独立磁盘冗余阵列)系统和/或分散存储系统,其使用纠错方案来编码用于存储的数据。
传统的秘密共享方案为安全性提供了一些好处。通常,这些方案在暴露数据之前至少需要违规的阈值数。在某些情况下,这比加密安全得多,至少当一个人控制存储这些共享的硬件时。但在其它情况下,当一个人无法控制存储硬件时,数据所有者必须相信控制硬件的实体不会使用其职位来访问共享的阈值数。
为了减少对硬件托管人的完全信任的需要,常规系统可以使用传统的密钥加密来加密数据,然后将其发送以存储在硬件中。因此,传统上使用两个单独的加密步骤的过程:1)在发送数据用于存储之前要存储的数据的初始加密;2)第二个单独的加密步骤,它使用秘密共享方案再次加密加密数据(encrypted data),用于将数据部分存储在存储硬件中。然而,传统的两步过程在计算开销方面是昂贵的,因为对数据执行了两个单独的加密操作。
附图说明
现在将参考附图仅通过示例的方式描述本发明的实施例,附图中:
图1是根据本发明的分散或分布式存储网络(DSN)的实施例的示意框图。
图2是根据本发明的计算核心的实施例的示意框图。
图3是根据本发明的数据的分散存储错误编码的示例的示意框图。
图4是根据本发明的错误编码功能的一般例子的示意框图。
图5是根据本发明的错误编码功能的具体例子的示意框图。
图6是根据本发明的编码数据切片(EDS)的切片名称的示例的示意框图。
图7是根据本发明的数据的分散存储错误解码的例子的示意框图。
图8是根据本发明的错误解码功能的一般例子的示意方框图。
图9是根据本发明的分散存储网络的另一实施例的示意框图。
图10是示出根据本发明的安全存储数据的示例的流程图。
具体实施方式
图1是分散或分布式存储网络(DSN)10的实施例的示意性框图,其包括多个计算设备12-16,管理单元18,完整性处理单元20和DSN存储器22。DSN 10的组件耦合到网络24,网络24可以包括一个或多个无线和/或有线通信系统;一个或多个非公共内联网系统和/或公共互联网系统;和/或一个或多个局域网(LAN)和/或广域网(WAN)。
DSN存储器22包括多个存储单元36,其可以位于地理上不同的站点(例如,芝加哥的一个站点,密尔沃基的一个站点等),公共站点或其组合。例如,如果DSN存储器22包括八个存储单元36,则每个存储单元位于不同的站点。作为另一示例,如果DSN存储器22包括八个存储单元36,则所有八个存储单元都位于相同的站点。作为又一示例,如果DSN存储器22包括八个存储单元36,则第一对存储单元位于第一公共站点,第二对存储单元位于第二公共站点,第三对存储单元位于第三公共站点,第四对存储单元位于第四公共站点。注意,DSN存储器22可以包括多于或少于八个存储单元36。进一步注意,每个存储单元36包括计算核心(如图2所示,或其组件)和用于存储分散的错误编码的数据的多个存储器设备。
计算设备12-16,管理单元18和完整性处理单元20中的每一个包括计算核心26,其包括网络接口30-33。计算设备12-16每个可以是便携式计算设备和/或固定计算设备。便携式计算设备可以是社交网络设备,游戏设备,手机,智能电话,数字助理,数字音乐播放器,数字视频播放器,膝上型计算机,手持式计算机,平板电脑,视频游戏控制器和/或包括计算核心的任何其他便携式设备。固定计算设备可以是计算机(PC),计算机服务器,有线机顶盒,卫星接收器,电视机,打印机,传真机,家庭娱乐设备,视频游戏控制台和/或任何类型的家庭或办公室计算设备。注意,管理单元18和完整性处理单元20中的每一个可以是单独的计算设备,可以是公共计算设备,和/或可以集成到一个或多个计算设备12-16中和/或集成到一个或多个存储单元36中。
每个接口30,32和33包括通过网络24间接和/或直接支持一个或多个通信链路的软件和硬件。例如,接口30支持计算设备14和16之间的通信链路(例如,有线,无线,直接,经由LAN,经由网络24等)。作为另一示例,接口32支持计算设备12和16以及DSN存储器22之间的通信链路(例如,有线连接,无线连接,LAN连接和/或到/从网络24的任何其他类型的连接)。作为又一示例,接口33支持管理单元18和完整性处理单元20中的每一个到网络24的通信链路。
计算设备12和16包括分散存储(DS)客户端模块34,其使得计算设备能够分散存储错误编码和解码数据(例如,数据40),如随后参考图3-8中的一个或多个所描述的。在该示例实施例中,计算设备16用作计算设备14的分散存储处理代理。在该角色中,计算设备16代表计算设备14分散存储错误编码和解码数据。使用分散存储错误编码和解码时,DSN 10容忍大量存储单元故障(故障的数量基于分散的存储错误编码功能的参数)而不丢失数据并且不需要数据的冗余或备份副本。此外,DSN 10以无限期的时间存储数据而没有数据丢失并且以安全的方式存储(例如,系统非常抵抗未经授权的访问数据的尝试)。
在操作中,管理单元18执行DS管理服务。例如,管理单元18分别为计算设备12-14或作为一组用户设备的一部分建立分布式数据存储参数(例如,库创建,分布式存储参数,安全参数,计费信息,用户简档信息等)。作为具体示例,管理单元18协调在用于用户设备,一组设备或用于公共访问的DSN存储器22内的库创建(例如,与DSN的整个命名空间的一部分相关联的虚拟存储器块)并为库建立每库分散存储(DS)错误编码参数。管理单元18通过更新DSN 10的注册表信息来促进每个库的DS错误编码参数的存储,其中注册表信息可以存储在DSN存储器22,计算设备12-16,管理单元18和/或完整性处理单元20中。
管理单元18在本地存储器中和/或DSN存储器22的存储器内创建和存储用户简档信息(例如,访问控制列表(ACL))。用户简档信息包括认证信息,许可和/或安全性参数。安全参数可以包括加密/解密方案,一个或多个加密密钥,密钥生成方案和/或数据编码/解码方案。
管理单元18为特定用户,用户组,库访问,公共库访问等创建计费信息。例如,管理单元18跟踪用户访问非公共库和/或公共的次数,其可用于生成按访问计费信息。在另一实例中,管理单元18跟踪由用户设备和/或用户组存储和/或检索的数据量,其可用于生成每数据量的计费信息。
作为另一示例,管理单元18执行网络操作,网络管理和/或网络维护。网络操作包括验证用户数据分配请求(例如,读取和/或写入请求),管理库的创建,为用户设备建立认证凭证,添加/删除组件(例如,用户设备,存储单元和/或具有DS客户端模块34的计算设备)到/来自DSN 10,和/或为存储单元36建立认证凭证。网络管理包括监视设备和/或单元的故障,维护库信息,确定设备和/或单元激活状态,确定设备和/或单元加载,和/或确定影响DSN 10的性能级别的任何其他系统级操作。网络维护包括促进替换,升级,修复和/或扩展DSN10的设备和/或单元。
完整性处理单元20执行“坏”或丢失编码数据切片的重建。在高级别,完整性处理单元20通过周期性地尝试从DSN存储器22检索/列出编码数据切片和/或编码数据切片的切片名称来执行重建。对于检索到的编码切片,检查它们由于数据损坏,过期版本等的错误。如果切片包含错误,则将其标记为“坏”切片。对于未接收和/或未列出的编码数据切片,它们被标记为丢失切片。随后使用被认为是良好切片的其他检索的编码数据切片来重建坏的和/或丢失的切片以产生重建的切片。重建的切片存储在DSN存储器22中。
图2是计算核心26的实施例的示意性框图,计算核心26包括处理模块50,存储器控制器52,主存储器54,视频图形处理单元55,输入/输出(IO)控制器56,外围设备组件互连(PCI)接口58,IO接口模块60,至少一个IO设备接口模块62,只读存储器(ROM)基本输入输出系统(BIOS)64,以及一个或多个存储器接口模块。一个或多个存储器接口模块包括通用串行总线(USB)接口模块66,主机总线适配器(HBA)接口模块68,网络接口模块70,闪存接口模块72,硬盘驱动器接口模块74和DSN接口模块76。
DSN接口模块76用于模仿传统的操作系统(OS)文件系统接口(例如,网络文件系统(NFS),闪存文件系统(FFS),磁盘文件系统(DFS),文件传输协议(FTP),基于web的分布式创作和版本控制(WebDAV)等))和/或块存储器接口(例如,小型计算机系统接口(SCSI),互联网小型计算机系统接口(iSCSI)等))。DSN接口模块76和/或网络接口模块70可以用作图1的接口30-33中的一个或多个。注意,IO设备接口模块62和/或存储器接口模块66-76可以被联合或单独称为IO端口。
图3是数据分散存储错误编码的示例的示意性框图。当计算设备12或16具有存储它的数据时,基于分散存储错误编码参数,根据分散存储错误编码流程对数据进行分散存储错误编码。分散存储错误编码参数包括编码功能(例如,信息分散算法,Reed-Solomon,Cauchy Reed-Solomon,系统编码,非系统编码,在线代码等),数据分段协议(例如,数据段大小,固定,变量等)和每个数据段编码值。每数据段编码值包括每数据段编码(即,在一组编码数据切片中)的编码数据切片的总数或柱宽,每数据段(即,在编码数据切片组中)编码的编码数据切片的数量(T);需要恢复数据段的编码数据切片组的编码数据切片的解码阈值数(D);编码数据切片读取阈值数(R),用于指示要从用于解码数据段的存储器读取的每组编码数据切片的数量;和/或写入阈值数(W),用于指示在编码数据段被认为已被正确存储之前必须准确存储的每组编码数据切片的数量。分散的存储错误编码参数还可以包括切片信息(例如,将为每个数据段创建的编码数据切片的数量)和/或切片安全信息(例如,每编码数据切片加密,压缩,完整性校验和等)。
在本示例中,已选择柯西里德所罗门(Cauchy Reed-Solomon)作为编码函数(图4中示出了一般示例,并且图5中示出了具体示例);数据分段协议是将数据对象划分为固定大小的数据段;每个数据段编码值包括:支柱宽度为5,解码阈值为3,读取阈值为4,写入阈值为4。根据数据分段协议,计算设备12或16划分数据(例如,文件(例如,文本,视频,音频等),数据对象或其他数据排列)到多个固定大小的数据段(例如,在千字节Kilo-bytes到万亿字节Tera-bytes范围内的固定大小的1到Y)。创建的数据段的数量取决于数据的大小和数据分段协议。
然后,计算设备12或16使用所选择的编码函数(例如,Cauchy Reed-Solomon)来分散存储错误对数据段进行编码,以产生一组编码数据切片。图4示出了通用的Cauchy Reed-Solomon编码函数,其包括编码矩阵(encoding matrix)(EM),数据矩阵(DM)和被编码的矩阵(coded matrix)(CM)。编码矩阵(EM)的大小取决于所选择的每数据段编码值柱宽度数(T)和解码阈值数(D)。为了产生数据矩阵(DM),数据段被分成多个数据块,数据块被排列成D行,每行Z个数据块。注意,Z是从数据段创建的数据块的数量和解码阈值数(D)的函数。通过矩阵将数据矩阵乘以编码矩阵来产生被编码的矩阵。
图5示出了Cauchy Reed-Solomon编码的具体示例,其中柱数(T)为5并且解码阈值数为3。在该示例中,第一数据段被分成12个数据块(D1-D12)。被编码的矩阵包括五行编码数据块,其中X11-X14的第一行对应于第一编码数据切片(EDS 1_1),X21-X24的第二行对应于第二编码数据切片(EDS 2_1),X31-X34的第三行对应于第三编码数据切片(EDS 3_1),X41-X44的第四行对应于第四编码数据切片(EDS 4_1),X51-X54的第五行对应于第五编码数据切片(EDS 5_1)。注意,EDS指定的第二个数字对应于数据段号。
返回到图3的讨论,计算设备还为该组编码数据切片中的每个编码数据切片(EDS)创建切片名称(SN)。切片名称80的典型格式如图6所示。如图所示,切片名称(SN)80包括编码数据切片(例如,1-T之一)的柱编号,数据段编号(例如,1-Y之一),库标识符(ID),数据对象标识符(ID),还可以包括编码数据切片的修订级别信息。片名称用作编码数据片的DSN地址的至少一部分,用于从DSN存储器22存储和检索。
作为编码的结果,计算设备12或16产生多组编码数据切片,这些编码数据切片以其各自的切片名称提供给存储单元用于存储。如图所示,第一组编码数据切片包括EDS 1_1至EDS 5_1,并且第一组切片名称包括SN 1_1至SN 5_1,并且最后一组编码数据切片包括EDS 1_Y至EDS 5_Y以及最后一组切片名称包括SN 1_Y到SN 5_Y。
图7是在图4的示例中分散存储错误编码和存储的数据对象的分散存储错误解码的示例的示意性框图。在该示例中,计算设备12或16从存储单元检索至少每数据段的编码数据切片的解码阈值数。作为具体示例,计算设备检索读取阈值数的编码数据切片。
为了从编码数据切片的解码阈值数恢复数据段,计算设备使用如图8所示的解码功能。如图所示,解码功能基本上是图4的编码功能的逆过程。被编码的矩阵包括解码阈值行数(例如,在该示例中为3)和编码矩阵的反转中的解码矩阵,编码矩阵包括被编码的矩阵的对应行。例如,如果被编码的矩阵包括行1,2和4,则编码矩阵被缩减为行1,2和4,然后被反转以产生解码矩阵。
接下来参考图9和10,讨论了可以用于使用秘密密钥有效地将数据加密成安全切片的各种实施例。在至少一些实施例中,仅需要单个加密步骤来提供使用两个单独的加密步骤的优点,但是比执行两个单独的加密步骤需要更少的计算资源。在各种实施例中,如下所述,提供两个输入作为加密设备的输入:秘密密钥(secret key)S和输入数据D。设备本身可以生成随机密钥,或者随机密钥R也可以作为输入提供。期望值V可以可选地附加到D,然后用随机密钥R加密结果以产生加密数据(encrypted data)E。密钥哈希(keyed-hash)(例如,密钥哈希H消息认证码HMAC(E,S)或者替代地(哈希(E)XOR S),或使用密钥在加密数据E上计算的任何类似的哈希函数,以产生密钥哈希H。
然后将密钥哈希H与随机密钥R组合(例如通过XOR,或模块化添加,或者在不知道H的情况下难以反转的任何可逆方式)以产生可以附加(或者前置或以其他方式添加)到加密数据E以完成编码并产生最终值F的被屏蔽密钥M(masked-key)。最终值F可以由信息分散算法(information dispersal algorithm,IDA)或纠删码算法(erasure code algorithm)分割或处理。结果只能用至少阈值数量的切片和S的知识来解码。鉴于这些,解码操作如下:至少解码切片的IDA阈值以恢复F;F分为E和M;S用于重新计算E的密钥哈希(Keyed-Hash),即H;H从M中解除组合以恢复随机加密密钥R;R用于解密E并恢复原始数据D(可选地附加预期值V);并且如果存在,则预期值V被验证并被剥离。如果V有效或未添加,则返回D。
图9是分散存储网络(DSN)的另一实施例的示意性框图,该DSN包括图1的加密模块84,密钥哈希(keyed-hash)模块86,屏蔽(masking)模块106,组合模块87,分布式存储和任务(DST)客户端模块88,DSN存储器22,有时称为分布式任务网络(DSTN)模块,DST客户端模块89,解组合模块90,密钥哈希(keyed-hash)模块91,去屏蔽模块114和解密模块94。每个加密模块84,密钥哈希(keyed-hash)模块1-2,屏蔽模块106,组合模块88,解组合模块90,去屏蔽模块114和解密模块94,可以利用图2的计算核心26来实现。DST客户端模块88和89可以利用图1的DST客户端模块34来实现。DSN用于安全地存储数据。
在数据的安全存储的操作的示例中,解密模块94利用随机密钥102来加密数据82以产生加密数据85。密钥哈希(keyed-hash)模块86利用秘密密钥98来在加密数据85上执行安全哈希函数,以产生哈希值104。例如,密钥哈希(keyed-hash)模块86利用秘密密钥98对加密数据85执行基于哈希的消息认证码(HMAC)功能以产生哈希值104。屏蔽模块106利用哈希值104屏蔽随机密钥以产生被屏蔽的随机密钥108。屏蔽包括模块化添加,例如异或功能。组合模块87组合加密数据85和被屏蔽的随机密钥108以产生安全包96。组合可以包括待决和交错中的至少一个。DST客户端模块88分散存储错误对编码安全包9以产生一组编码数据切片1-n,用于存储在DSN存储器22中。
当恢复数据时,DST客户端模块89分散存储错误解码对编码数据片组1-n的编码数据片的解码阈值数,以再现安全包96。解组合模块90对安全包96进行解组合以再现被屏蔽的随机密钥108和加密数据85。密钥哈希模块91利用秘密密钥98对再现的加密数据85执行安全哈希函数以再现哈希值104。去屏蔽模块114利用哈希值104去屏蔽被屏蔽的随机密钥108以产生恢复的随机密钥116。例如,去屏蔽模块114对被屏蔽的随机密钥108和哈希值104执行异或功能以产生恢复的随机密钥116。解密模块94利用恢复的随机密钥116解密加密数据85以产生再现数据100。这样,DSN执行系统性能改进,只需要一次数据的加密处理步骤而不是两次,使得需要每组编码数据切片的编码数据切片的解码阈值数和秘密密钥来恢复数据。
图10是示出安全地存储数据的示例的流程图。该方法包括框118,其中处理模块(例如,分布式存储和任务(DST)客户端模块)使用随机密钥加密数据以产生加密数据。该方法在框120处继续,其中处理模块使用秘密密钥对加密数据执行安全哈希函数以产生哈希值。该方法在框122处继续,其中处理模块使用哈希值来屏蔽随机密钥以产生被屏蔽的随机密钥(masked random key)。该方法在框124处继续,其中处理模块组合加密数据和被屏蔽的随机密钥以产生安全包。组合可以包括待决和交错中的一个或多个。该方法在框126处继续,其中处理模块对安全包进行编码以产生编码数据切片组以存储在存储单元组中。
当恢复数据时,该方法在框128处继续,其中处理模块对从该组存储单元获得的编码数据切片组的编码数据切片的解码阈值数进行解码以再现安全包。该方法在框130处继续,其中处理模块对安全包进行解组合以再现被屏蔽的随机密钥和加密数据。该方法在框132处继续,其中处理模块对再现的加密数据执行安全哈希函数以再现哈希值。该方法在框134处继续,其中处理模块使用哈希值对被屏蔽的随机密钥进行解屏蔽以产生恢复的随机密钥。例如,处理模块对被屏蔽的随机密钥和哈希值执行异或(XOR)功能,以产生恢复的随机密钥。该方法在框136处继续,其中处理模块使用恢复的随机密钥对再现的加密数据进行解密以生成再现数据。
注意,可以在本文中使用的术语,诸如比特流,流,信号序列等(或它们的等同物)可互换地用于描述数字信息,其内容对应于多种期望类型(例如,数据,视频,语音,音频等,其中任何一种通常可称为“数据”)的任意一种。
如本文可能使用的,术语“基本上”和“大致”为其对应的术语和/或项目之间的相对性提供了行业可接受的容差。这种工业上可接受的容差范围从小于百分之一到百分之五十,并且对应于但不限于元件值,集成电路工艺变化,温度变化,上升和下降时间和/或热噪声。项目之间的这种相关性的范围从几个百分点的差异到数量级的差异。如本文中还可以使用的,术语“被配置为”,“可操作地耦合到”,“耦合到”和/或“耦合”包括项目之间的直接耦合和/或经由介入项目的项目之间的间接耦合(例如,项目包括但不限于组件,元件,电路和/或模块),其中,对于间接耦合的示例,介入项目不修改信号的信息但可以调整其电流水平,电压水平和/或功率水平。如本文中可进一步使用的,推断的耦合(即,其中一个元件通过推断耦合到另一个元件)包括以与“耦合到”相同的方式在两个项目之间的直接和间接耦合。如本文甚至可以进一步使用的,术语“配置为”,“可操作地”,“耦合到”或“可操作地耦合到”指示项目包括电源连接,输入,输出中的一个或多个(s)等,当被激活时,执行其一个或多个其相应的功能,并且还可以包括推断的耦合到一个或多个其他项目。如本文中还可进一步使用的,术语“与......相关联”包括单独项目的直接和/或间接耦合和/或将一个项目嵌入另一项目中。
如这里可以使用的,术语“有利地比较”表示两个或更多个项目,信号等之间的比较提供了期望的关系。例如,当期望的关系是信号1具有比信号2更大的幅度时,当信号1的幅度大于信号2的幅度或者当信号2的幅度小于信号2的幅度时,可以实现有利的比较。如本文中可能使用的,术语“不利地比较”表示两个或更多个项目,信号等之间的比较未能提供期望的关系。
如这里还可以使用的,术语“处理模块”,“处理电路”,“处理器”和/或“处理单元”可以是单个处理设备或多个处理设备。这种处理设备可以是微处理器,微控制器,数字信号处理器,微计算机,中央处理单元,现场可编程门阵列,可编程逻辑设备,状态机,逻辑电路,模拟电路,数字电路和/或任何设备,其基于电路和/或操作指令的硬编码来操纵信号(模拟和/或数字)。处理模块,模块,处理电路和/或处理单元可以是或者进一步包括存储器和/或集成存储器元件,其可以是另一处理模块的单个存储器设备,多个存储器设备和/或嵌入式电路。这样的存储器设备可以是只读存储器,随机存取存储器,易失性存储器,非易失性存储器,静态存储器,动态存储器,闪存,高速缓冲存储器和/或存储数字信息的任何设备。注意,如果处理模块,模块,处理电路和/或处理单元包括多于一个处理设备,则处理设备可以位于中央(例如,经由有线和/或无线总线结构直接耦合在一起)或者可以是分布式定位(例如,通过局域网和/或广域网间接耦合的云计算)。进一步注意,如果处理模块,模块,处理电路和/或处理单元经由状态机,模拟电路,数字电路和/或逻辑电路实现其一个或多个功能,则存储器和/或存储器元件存储相应的操作指令可以嵌入在包括状态机,模拟电路,数字电路和/或逻辑电路的电路内或外部。还要注意,存储元件可以存储,并且处理模块,模块,处理电路和/或处理单元执行与至少一些步骤和/或功能相对应的硬编码和/或操作指令,如一个或更多的附图所示。这种存储器件或存储元件可以包括在制品中。
如上所述,一个或多个实施例已经示出指定的功能的性能及其关系的方法步骤。为了便于描述,这里任意定义了这些功能构建块和方法步骤的边界和顺序。只要适当地执行指定的函数和关系,就可以定义替代边界和顺序。因此,任何这样的替代边界或序列都在权利要求的范围和精神内。此外,为了便于描述,这些功能构建块的边界已被任意定义。只要适当地执行某些重要功能,就可以定义替代边界。类似地,流程图块也可以在本文中任意定义以说明某些重要功能。
为了使用的程度,流程图模块的界限和顺序可以被另外定义,只要仍能实现这些显著功能。因此,功能构建块和流程图块和序列的这种替代定义都在权利要求的范围和精神内。本领域普通技术人员还将认识到,本文中的功能构建块和其他说明性块,模块和组件可以如图所示实现,或者由分立组件,专用集成电路,执行适当软件的处理器等或其组合实现
此外,流程图可以包括“开始”和/或“继续”指示。“开始”和“继续”指示反映了所呈现的步骤可以任选地结合在其他例程中或以其他方式与其他例程结合使用。在此上下文中,“开始”表示所呈现的第一步骤的开始,并且可以在未明确示出的其他活动之前。此外,“继续”指示反映了所呈现的步骤可以多次执行和/或可以由未具体示出的其他活动继承。此外,尽管流程图表示步骤的特定顺序,但是其他顺序同样是可能的,只要保持因果关系原则即可。
该一个或多个实施例在本文中用于说明的一个或多个方面,一个或多个特征,一个或多个概念,和/或一个或多个示例。装置,制品,机器和/或过程的物理实施例可包括参考本文所讨论的一个或多个实施例描述的一个或多个方面,特征,概念,示例等。此外,从图到图,实施例可以包含相同或类似命名的功能,步骤,模块等,其可以使用相同或不同的附图标记,并且因此,功能,步骤,模块等可以是相同或相似的或不同的功能,步骤,模块等。
除非特别声明相反,在一个或多个附图中所示的来自元件或在元件间的信号可以是模拟的或数字的,时间连续的或时间离散的,以及单端(single-ended)或差分的(differential)。例如,如果信号路径显示为单端路径,则它还表示差分信号路径。类似地,如果信号路径显示为差分路径,则它还表示单端信号路径。虽然本文描述了一个或多个特定体系结构,但是同样可以实现其他体系结构,其使用未明确示出的一个或多个数据总线,元件之间的直接连接,和/或本领域普通技术人员认识到的其他元件之间的间接耦合。。
术语“模块”在一个或多个实施例的描述中使用。模块经由诸如处理器或其他处理设备之类的设备或可以包括存储操作指令的存储器或与存储操作指令相关联的其他硬件来实现一个或多个功能。模块可以独立地操作和/或与软件和/或固件一起操作。还如本文中所使用的,模块可以包含一个或多个子模块,每个子模块可以是一个或多个模块。
作为可以进一步被本文使用的,计算机可读存储器包括一个或多个存储元件。存储器元件可以是单独的存储器设备,多个存储器设备或存储器设备内的一组存储器位置。这样的存储器设备可以是只读存储器,随机存取存储器,易失性存储器,非易失性存储器,静态存储器,动态存储器,闪存,高速缓冲存储器和/或存储数字信息的任何设备。存储器设备可以是固态存储器,硬盘驱动器存储器,云存储器,拇指驱动器,服务器存储器,计算设备存储器和/或用于存储数字信息的其他物理介质的形式。
尽管已经在本文中明确描述的各种功能和一个或多个实施例的特征的特定组合,但是这些特征和功能的其他组合也是可能的。本公开不受本文公开的具体实施例的限制,并且明确地包含这些其他组合。
Claims (20)
1.一种在分散存储网络中使用的方法,该方法包括:
使用随机密钥加密起始数据以产生加密数据;
使用秘密密钥对加密数据执行安全哈希函数以产生哈希值;
使用哈希值屏蔽随机密钥以产生屏蔽的随机密钥;
将加密数据和屏蔽的随机密钥组合以产生安全包;
编码安全包以产生编码数据切片组,其中包括在编码数据切片组中的编码数据切片的秘密密钥和解码阈值数足以恢复安全包和起始数据,并且其中解码阈值数大于1且小于编码数据切片组中的编码数据切片的总数;和
将编码数据切片组存储在存储单元组中。
2.如权利要求1所述的方法,还包括:
通过解码编码数据切片的解码阈值数来恢复安全包;和
使用秘密密钥从安全包中恢复起始数据。
3.如权利要求2所述的方法,其中,恢复起始数据还包括:
将安全包解组合为加密数据和被屏蔽的随机密钥。
4.如权利要求3所述的方法,还包括:
使用秘密密钥恢复哈希值;
使用哈希值去屏蔽被屏蔽的随机密钥并生成恢复的随机密钥;和
使用被恢复的随机密钥解密加密数据。
5.如权利要求1所述的方法,其中,屏蔽所述随机密钥包括:
执行异或(XOR)函数或模块化添加之一。
6.如权利要求1所述的方法,其中组合包括:
附加,前置,插入或交错之一。
7.如权利要求1所述的方法,其中编码安全包以产生编码数据切片组包括使用纠删码算法。
8.分散存储网络,包括:
加密模块,使用处理器和相关存储器实现,加密模块被配置为使用随机密钥加密起始数据以产生加密数据;
使用处理器和相关存储器实现的哈希模块,哈希模块被配置为使用秘密密钥对加密数据执行安全哈希函数以产生哈希值;
处理电路,被配置为使用哈希值来屏蔽随机密钥以产生被屏蔽的随机密钥;
处理电路还被配置为组合加密数据和被屏蔽的随机密钥以产生安全包;
分布式存储和任务模块,被配置为对安全包进行编码以产生编码数据切片组,其中包括在该编码数据切片组中的编码数据切片的秘密密钥和解码阈值数足以恢复安全包和起始数据,其中,解码阈值数大于1且小于该编码数据切片组中的编码数据切片的总数;和
处理电路,被配置为将该编码数据切片组存储在存储单元组中。
9.如权利要求8所述的分散存储网络,还包括处理电路,被配置为:
通过解码编码数据切片的解码阈值数来恢复安全包;和
使用秘密密钥从安全包中恢复起始数据。
10.如权利要求9所述的分散存储网络,其中,被配置为恢复起始数据的处理电路还被配置为:
将安全包解组合为加密数据和被屏蔽的随机密钥。
11.如权利要求10所述的分散存储网络,其中,配置为恢复起始数据的处理电路还被配置为:
使用秘密密钥恢复哈希值;
使用哈希值去屏蔽被屏蔽的随机密钥并生成恢复的随机密钥;和
使用恢复的随机密钥解密加密数据。
12.如权利要求8所述的分散存储网络,其中,被配置为屏蔽随机密钥的处理电路还被配置为:
执行异或(XOR)函数或模块化添加之一。
13.如权利要求8所述的分散存储网络,其中,被配置为组合的处理电路还被配置为执行以下之一:
将被屏蔽的随机密钥附加到加密数据中;
将被屏蔽的随机密钥前置到加密数据中;
将被屏蔽的随机密钥插入到加密数据中;或者
在加密数据中交错被屏蔽的随机密钥。
14.如权利要求8所述的分散存储网络,其中,所述分布式存储和任务模块使用纠删码算法对所述安全包进行编码以产生编码数据切片组。
15.一种在分散存储网络中使用的方法,该方法包括:
使用随机密钥加密起始数据以产生加密数据;
使用秘密密钥对加密数据执行安全哈希函数以产生哈希值;
使用哈希值屏蔽随机密钥以产生被屏蔽的随机密钥;
将加密数据和被屏蔽的随机密钥组合以产生安全包;
编码安全包以产生编码数据切片组,其中包括在该编码数据切片组中的编码数据切片的秘密密钥和解码阈值数足以恢复安全包和起始数据,并且其中解码阈值数大于1且小于编码数据切片组中的编码数据切片的总数;
将编码数据切片组存储在存储单元组中;和
使用至少编码数据切片的解码阈值数和秘密密钥来恢复起始数据。
16.如权利要求15所述的方法,还包括:
通过解码编码数据切片的解码阈值数来恢复安全包;和
使用秘密密钥从安全包中恢复起始数据。
17.如权利要求16所述的方法,其中,恢复起始数据还包括:
将安全包解组合为加密数据和被屏蔽的随机密钥。
18.如权利要求17所述的方法,还包括:
使用秘密密钥恢复哈希值;
使用哈希值去屏蔽被屏蔽的随机密钥并生成恢复的随机密钥;和
使用恢复的随机密钥解密加密数据。
19.如权利要求15所述的方法,其中组合包括:
附加,前置,插入或交错之一。
20.根据权利要求15所述的方法,其中编码所述安全包以产生一组编码数据切片包括使用纠删码算法。
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201662301214P | 2016-02-29 | 2016-02-29 | |
US62/301,214 | 2016-02-29 | ||
US15/410,329 | 2017-01-19 | ||
US15/410,329 US10326740B2 (en) | 2016-02-29 | 2017-01-19 | Efficient secret-key encrypted secure slice |
PCT/IB2017/051010 WO2017149410A1 (en) | 2016-02-29 | 2017-02-22 | Efficient secret-key encrypted secure slice |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108701197A true CN108701197A (zh) | 2018-10-23 |
Family
ID=59678482
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780008333.0A Pending CN108701197A (zh) | 2016-02-29 | 2017-02-22 | 高效的秘密密钥加密的安全切片 |
Country Status (4)
Country | Link |
---|---|
US (13) | US10089178B2 (zh) |
CN (1) | CN108701197A (zh) |
DE (1) | DE112017000220T5 (zh) |
WO (1) | WO2017149410A1 (zh) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110058820A (zh) * | 2019-04-23 | 2019-07-26 | 武汉汇迪森信息技术有限公司 | 基于固态盘阵列的数据安全写入、删除、读取方法及装置 |
CN111813331A (zh) * | 2019-04-10 | 2020-10-23 | 阿里巴巴集团控股有限公司 | 用于操作数据存储系统的方法、系统和非暂时性计算机可读介质 |
CN112468494A (zh) * | 2020-11-26 | 2021-03-09 | 湖北航天信息技术有限公司 | 一种内外网互联网数据传输方法及装置 |
CN112764677A (zh) * | 2021-01-14 | 2021-05-07 | 杭州电子科技大学 | 一种在云存储中增强数据迁移安全性的方法 |
CN114785484A (zh) * | 2022-04-06 | 2022-07-22 | 河南省怡之发电子科技有限公司 | 一种大数据安全传输方法及系统 |
Families Citing this family (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10447474B2 (en) * | 2009-04-20 | 2019-10-15 | Pure Storage, Inc. | Dispersed data storage system data decoding and decryption |
WO2017048221A1 (en) * | 2015-09-14 | 2017-03-23 | Hewlett Packard Enterprise Development Lp | Secure memory systems |
US10277490B2 (en) * | 2016-07-19 | 2019-04-30 | International Business Machines Corporation | Monitoring inter-site bandwidth for rebuilding |
WO2018063840A1 (en) * | 2016-09-28 | 2018-04-05 | D5A1 Llc; | Learning coach for machine learning system |
US10262751B2 (en) * | 2016-09-29 | 2019-04-16 | Intel Corporation | Multi-dimensional optimization of electrical parameters for memory training |
US10481977B2 (en) * | 2016-10-27 | 2019-11-19 | International Business Machines Corporation | Dispersed storage of error encoded data objects having multiple resolutions |
US10762891B2 (en) * | 2017-02-10 | 2020-09-01 | Synaptics Incorporated | Binary and multi-class classification systems and methods using connectionist temporal classification |
US11100932B2 (en) * | 2017-02-10 | 2021-08-24 | Synaptics Incorporated | Robust start-end point detection algorithm using neural network |
US10762417B2 (en) * | 2017-02-10 | 2020-09-01 | Synaptics Incorporated | Efficient connectionist temporal classification for binary classification |
US11853884B2 (en) * | 2017-02-10 | 2023-12-26 | Synaptics Incorporated | Many or one detection classification systems and methods |
US11087213B2 (en) * | 2017-02-10 | 2021-08-10 | Synaptics Incorporated | Binary and multi-class classification systems and methods using one spike connectionist temporal classification |
US11080600B2 (en) * | 2017-02-10 | 2021-08-03 | Synaptics Incorporated | Recurrent neural network based acoustic event classification using complement rule |
CN108427615B (zh) * | 2017-02-13 | 2020-11-27 | 腾讯科技(深圳)有限公司 | 一种消息监控方法及装置 |
US10762427B2 (en) * | 2017-03-01 | 2020-09-01 | Synaptics Incorporated | Connectionist temporal classification using segmented labeled sequence data |
US10437691B1 (en) * | 2017-03-29 | 2019-10-08 | Veritas Technologies Llc | Systems and methods for caching in an erasure-coded system |
JP6959155B2 (ja) * | 2017-05-15 | 2021-11-02 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America | 検証方法、検証装置およびプログラム |
US10379979B2 (en) * | 2017-05-31 | 2019-08-13 | Western Digital Technologies, Inc. | Power fail handling using stop commands |
US10409667B2 (en) * | 2017-06-15 | 2019-09-10 | Salesforce.Com, Inc. | Error assignment for computer programs |
US11157194B2 (en) * | 2018-01-12 | 2021-10-26 | International Business Machines Corporation | Automated predictive tiered storage system |
US11321612B2 (en) | 2018-01-30 | 2022-05-03 | D5Ai Llc | Self-organizing partially ordered networks and soft-tying learned parameters, such as connection weights |
CN108319545B (zh) * | 2018-02-01 | 2021-07-16 | 联想(北京)有限公司 | 一种信息处理方法及电子设备 |
CN108388748A (zh) * | 2018-03-12 | 2018-08-10 | 北京理工大学 | 一种爆轰数值仿真串行程序中断续算方法 |
CN108459922A (zh) * | 2018-03-12 | 2018-08-28 | 北京理工大学 | 一种爆轰数值仿真并行程序中断续算方法 |
US11412041B2 (en) | 2018-06-25 | 2022-08-09 | International Business Machines Corporation | Automatic intervention of global coordinator |
CN110659069B (zh) * | 2018-06-28 | 2022-08-19 | 赛灵思公司 | 用于执行神经网络计算的指令调度方法及相应计算系统 |
CN109034413A (zh) * | 2018-07-11 | 2018-12-18 | 广东人励智能工程有限公司 | 基于神经网络模型的智能制造设备故障预测方法及系统 |
US10606479B2 (en) | 2018-08-07 | 2020-03-31 | International Business Machines Corporation | Catastrophic data loss prevention by global coordinator |
CN109344036A (zh) * | 2018-10-08 | 2019-02-15 | 郑州云海信息技术有限公司 | 应用于存储系统的告警展示方法及系统 |
CN111124793A (zh) * | 2018-11-01 | 2020-05-08 | 中国移动通信集团浙江有限公司 | 磁盘阵列控制器性能异常检测方法及系统 |
KR20200053886A (ko) * | 2018-11-09 | 2020-05-19 | 삼성전자주식회사 | 뉴럴 프로세싱 유닛, 뉴럴 프로세싱 시스템, 및 어플리케이션 시스템 |
US10970149B2 (en) * | 2019-01-03 | 2021-04-06 | International Business Machines Corporation | Automatic node hardware configuration in a distributed storage system |
US11023307B2 (en) | 2019-01-03 | 2021-06-01 | International Business Machines Corporation | Automatic remediation of distributed storage system node components through visualization |
CN109739213A (zh) * | 2019-01-07 | 2019-05-10 | 东莞百宏实业有限公司 | 一种故障预测系统以及预测方法 |
US11275672B2 (en) * | 2019-01-29 | 2022-03-15 | EMC IP Holding Company LLC | Run-time determination of application performance with low overhead impact on system performance |
US10880377B2 (en) * | 2019-04-05 | 2020-12-29 | Netapp, Inc. | Methods and systems for prioritizing events associated with resources of a networked storage system |
CN110162923B (zh) * | 2019-06-03 | 2020-04-03 | 北京卫星环境工程研究所 | 面向航天器总装的柔性电缆工艺数字样机构建系统及方法 |
FI129028B (fi) * | 2019-06-19 | 2021-05-31 | Elisa Oyj | Huoltoprioriteetti kommunikaatioverkossa |
US11205319B2 (en) | 2019-06-21 | 2021-12-21 | Sg Gaming, Inc. | System and method for synthetic image training of a neural network associated with a casino table game monitoring system |
SG10201906806XA (en) * | 2019-07-23 | 2021-02-25 | Mastercard International Inc | Methods and computing devices for auto-submission of user authentication credential |
US10691528B1 (en) * | 2019-07-23 | 2020-06-23 | Core Scientific, Inc. | Automatic repair of computing devices in a data center |
WO2021040764A1 (en) * | 2019-08-23 | 2021-03-04 | Landmark Graphics Corporation | Ai/ml based drilling and production platform |
NO20220090A1 (en) * | 2019-08-23 | 2022-01-21 | Landmark Graphics Corp | Ai/ml based drilling and production platform |
CN110493247B (zh) * | 2019-08-29 | 2022-08-02 | 南方电网科学研究院有限责任公司 | 一种配电终端通信检测方法、系统、设备及计算机介质 |
JP2021118370A (ja) * | 2020-01-22 | 2021-08-10 | キオクシア株式会社 | メモリシステム、情報処理装置、および情報処理システム |
JP7428016B2 (ja) * | 2020-03-05 | 2024-02-06 | 京セラドキュメントソリューションズ株式会社 | ファイル送信装置 |
CN112053726B (zh) * | 2020-09-09 | 2022-04-12 | 哈尔滨工业大学 | 一种基于Er态阈值电压分布的闪存误擦除数据恢复方法 |
EP4226573A1 (en) | 2020-10-05 | 2023-08-16 | Redcom Laboratories, Inc. | Zkmfa: zero-knowledge based multi-factor authentication system |
EP4092963B1 (en) * | 2021-05-20 | 2024-05-08 | Ovh | Method and system for datacenter network device maintenance |
US11722146B1 (en) * | 2022-01-21 | 2023-08-08 | Nxp B.V. | Correction of sigma-delta analog-to-digital converters (ADCs) using neural networks |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101166089A (zh) * | 2006-10-18 | 2008-04-23 | 株式会社东芝 | 秘密信息管理设备与秘密信息管理系统 |
US8885821B2 (en) * | 2010-01-28 | 2014-11-11 | Cleversafe, Inc. | Sequencing encoded data slices |
US9203812B2 (en) * | 2009-04-20 | 2015-12-01 | Cleversafe, Inc. | Dispersed storage network with encrypted portion withholding and methods for use therewith |
Family Cites Families (139)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4092732A (en) | 1977-05-31 | 1978-05-30 | International Business Machines Corporation | System for recovering data stored in failed memory unit |
US5485474A (en) | 1988-02-25 | 1996-01-16 | The President And Fellows Of Harvard College | Scheme for information dispersal and reconstruction |
US5454101A (en) | 1992-09-15 | 1995-09-26 | Universal Firmware Industries, Ltd. | Data storage system with set lists which contain elements associated with parents for defining a logical hierarchy and general record pointers identifying specific data sets |
US5987622A (en) | 1993-12-10 | 1999-11-16 | Tm Patents, Lp | Parallel computer system including parallel storage subsystem including facility for correction of data in the event of failure of a storage device in parallel storage subsystem |
US6175571B1 (en) | 1994-07-22 | 2001-01-16 | Network Peripherals, Inc. | Distributed memory switching hub |
JP3180940B2 (ja) * | 1994-11-28 | 2001-07-03 | 京セラミタ株式会社 | 画像形成装置のメンテナンス管理装置 |
US5848230A (en) | 1995-05-25 | 1998-12-08 | Tandem Computers Incorporated | Continuously available computer memory systems |
US5774643A (en) | 1995-10-13 | 1998-06-30 | Digital Equipment Corporation | Enhanced raid write hole protection and recovery |
US5809285A (en) | 1995-12-21 | 1998-09-15 | Compaq Computer Corporation | Computer system having a virtual drive array controller |
US6012159A (en) | 1996-01-17 | 2000-01-04 | Kencast, Inc. | Method and system for error-free data transfer |
US5802364A (en) | 1996-04-15 | 1998-09-01 | Sun Microsystems, Inc. | Metadevice driver rename/exchange technique for a computer system incorporating a plurality of independent device drivers |
US5890156A (en) | 1996-05-02 | 1999-03-30 | Alcatel Usa, Inc. | Distributed redundant database |
US6058454A (en) | 1997-06-09 | 2000-05-02 | International Business Machines Corporation | Method and system for automatically configuring redundant arrays of disk memory devices |
US6088330A (en) | 1997-09-09 | 2000-07-11 | Bruck; Joshua | Reliable array of distributed computing nodes |
US5991414A (en) | 1997-09-12 | 1999-11-23 | International Business Machines Corporation | Method and apparatus for the secure distributed storage and retrieval of information |
US6272658B1 (en) | 1997-10-27 | 2001-08-07 | Kencast, Inc. | Method and system for reliable broadcasting of data files and streams |
JPH11161505A (ja) | 1997-12-01 | 1999-06-18 | Matsushita Electric Ind Co Ltd | メディア送出装置 |
JPH11167443A (ja) | 1997-12-02 | 1999-06-22 | Casio Comput Co Ltd | インターフェイス装置 |
US6415373B1 (en) | 1997-12-24 | 2002-07-02 | Avid Technology, Inc. | Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner |
US6374336B1 (en) | 1997-12-24 | 2002-04-16 | Avid Technology, Inc. | Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner |
CA2341014A1 (en) | 1998-08-19 | 2000-03-02 | Alexander Roger Deas | A system and method for defining transforms of memory device addresses |
US6356949B1 (en) | 1999-01-29 | 2002-03-12 | Intermec Ip Corp. | Automatic data collection device that receives data output instruction from data consumer |
US6578144B1 (en) | 1999-03-23 | 2003-06-10 | International Business Machines Corporation | Secure hash-and-sign signatures |
US6609223B1 (en) | 1999-04-06 | 2003-08-19 | Kencast, Inc. | Method for packet-level fec encoding, in which on a source packet-by-source packet basis, the error correction contributions of a source packet to a plurality of wildcard packets are computed, and the source packet is transmitted thereafter |
US6671824B1 (en) * | 1999-04-19 | 2003-12-30 | Lakefield Technologies Group | Cable network repair control system |
US6434715B1 (en) * | 1999-06-14 | 2002-08-13 | General Electric Company | Method of detecting systemic fault conditions in an intelligent electronic device |
US6571282B1 (en) | 1999-08-31 | 2003-05-27 | Accenture Llp | Block-based communication in a communication services patterns environment |
US6516425B1 (en) * | 1999-10-29 | 2003-02-04 | Hewlett-Packard Co. | Raid rebuild using most vulnerable data redundancy scheme first |
US6826711B2 (en) | 2000-02-18 | 2004-11-30 | Avamar Technologies, Inc. | System and method for data protection with multidimensional parity |
US6718361B1 (en) | 2000-04-07 | 2004-04-06 | Network Appliance Inc. | Method and apparatus for reliable and scalable distribution of data files in distributed networks |
US20160078695A1 (en) * | 2000-05-01 | 2016-03-17 | General Electric Company | Method and system for managing a fleet of remote assets and/or ascertaining a repair for an asset |
US6496814B1 (en) * | 2000-07-19 | 2002-12-17 | International Business Machines Corporation | Method and system for integrating spatial analysis, and scheduling to efficiently schedule and monitor infrastructure maintenance |
WO2002035359A2 (en) | 2000-10-26 | 2002-05-02 | Prismedia Networks, Inc. | Method and system for managing distributed content and related metadata |
US7103915B2 (en) | 2000-11-13 | 2006-09-05 | Digital Doors, Inc. | Data security system and method |
US7140044B2 (en) | 2000-11-13 | 2006-11-21 | Digital Doors, Inc. | Data security system and method for separation of user communities |
US7146644B2 (en) | 2000-11-13 | 2006-12-05 | Digital Doors, Inc. | Data security system and method responsive to electronic attacks |
US8176563B2 (en) | 2000-11-13 | 2012-05-08 | DigitalDoors, Inc. | Data security system and method with editor |
GB2369206B (en) | 2000-11-18 | 2004-11-03 | Ibm | Method for rebuilding meta-data in a data storage system and a data storage system |
US6785783B2 (en) | 2000-11-30 | 2004-08-31 | International Business Machines Corporation | NUMA system with redundant main memory architecture |
US7080101B1 (en) | 2000-12-01 | 2006-07-18 | Ncr Corp. | Method and apparatus for partitioning data for storage in a database |
US20020080888A1 (en) | 2000-12-22 | 2002-06-27 | Li Shu | Message splitting and spatially diversified message routing for increasing transmission assurance and data security over distributed networks |
WO2002065275A1 (en) | 2001-01-11 | 2002-08-22 | Yottayotta, Inc. | Storage virtualization system and methods |
US20020156973A1 (en) | 2001-01-29 | 2002-10-24 | Ulrich Thomas R. | Enhanced disk array |
US20030037261A1 (en) | 2001-03-26 | 2003-02-20 | Ilumin Corporation | Secured content delivery system and method |
US6879596B1 (en) | 2001-04-11 | 2005-04-12 | Applied Micro Circuits Corporation | System and method for systolic array sorting of information segments |
US7024609B2 (en) | 2001-04-20 | 2006-04-04 | Kencast, Inc. | System for protecting the transmission of live data streams, and upon reception, for reconstructing the live data streams and recording them into files |
GB2377049A (en) | 2001-06-30 | 2002-12-31 | Hewlett Packard Co | Billing for utilisation of a data storage array |
US6944785B2 (en) | 2001-07-23 | 2005-09-13 | Network Appliance, Inc. | High-availability cluster virtual server system |
US7636724B2 (en) | 2001-08-31 | 2009-12-22 | Peerify Technologies LLC | Data storage system and method by shredding and deshredding |
US20050021359A1 (en) * | 2001-11-02 | 2005-01-27 | Mckinney Jerry L. | Monitoring system and method |
US7024451B2 (en) | 2001-11-05 | 2006-04-04 | Hewlett-Packard Development Company, L.P. | System and method for maintaining consistent independent server-side state among collaborating servers |
US7003688B1 (en) | 2001-11-15 | 2006-02-21 | Xiotech Corporation | System and method for a reserved memory area shared by all redundant storage controllers |
US7171493B2 (en) | 2001-12-19 | 2007-01-30 | The Charles Stark Draper Laboratory | Camouflage of network traffic to resist attack |
EP1547252A4 (en) | 2002-07-29 | 2011-04-20 | Robert Halford | MULTIDIMENSIONAL DATA PROTECTION AND MIRRORING METHOD FOR MICROBIAL DATA |
US7051155B2 (en) | 2002-08-05 | 2006-05-23 | Sun Microsystems, Inc. | Method and system for striping data to accommodate integrity metadata |
US20040122917A1 (en) | 2002-12-18 | 2004-06-24 | Menon Jaishankar Moothedath | Distributed storage system for data-sharing among client computers running defferent operating system types |
JP2006526204A (ja) | 2003-03-13 | 2006-11-16 | ディーアールエム テクノロジーズ、エルエルシー | セキュアストリーミングコンテナ |
US7185144B2 (en) | 2003-11-24 | 2007-02-27 | Network Appliance, Inc. | Semi-static distribution technique |
GB0308264D0 (en) | 2003-04-10 | 2003-05-14 | Ibm | Recovery from failures within data processing systems |
GB0308262D0 (en) | 2003-04-10 | 2003-05-14 | Ibm | Recovery from failures within data processing systems |
US7415115B2 (en) | 2003-05-14 | 2008-08-19 | Broadcom Corporation | Method and system for disaster recovery of data from a storage device |
WO2005017737A2 (en) | 2003-08-14 | 2005-02-24 | Compellent Technologies | Virtual disk drive system and method |
US7373559B2 (en) * | 2003-09-11 | 2008-05-13 | Copan Systems, Inc. | Method and system for proactive drive replacement for high availability storage systems |
US7899059B2 (en) | 2003-11-12 | 2011-03-01 | Agere Systems Inc. | Media delivery using quality of service differentiation within a media stream |
US8332483B2 (en) | 2003-12-15 | 2012-12-11 | International Business Machines Corporation | Apparatus, system, and method for autonomic control of grid system resources |
US7206899B2 (en) | 2003-12-29 | 2007-04-17 | Intel Corporation | Method, system, and program for managing data transfer and construction |
US7222133B1 (en) | 2004-02-05 | 2007-05-22 | Unisys Corporation | Method for reducing database recovery time |
US7240236B2 (en) | 2004-03-23 | 2007-07-03 | Archivas, Inc. | Fixed content distributed data storage using permutation ring encoding |
US7231578B2 (en) | 2004-04-02 | 2007-06-12 | Hitachi Global Storage Technologies Netherlands B.V. | Techniques for detecting and correcting errors using multiple interleave erasure pointers |
JP2005326935A (ja) * | 2004-05-12 | 2005-11-24 | Hitachi Ltd | 仮想化ストレージを備える計算機システムの管理サーバおよび障害回避復旧方法 |
US7594063B1 (en) * | 2004-08-27 | 2009-09-22 | Lexar Media, Inc. | Storage capacity status |
JP4446839B2 (ja) | 2004-08-30 | 2010-04-07 | 株式会社日立製作所 | ストレージ装置及びストレージ管理装置 |
JP2006107080A (ja) * | 2004-10-05 | 2006-04-20 | Hitachi Ltd | ストレージ装置システム |
US7680771B2 (en) | 2004-12-20 | 2010-03-16 | International Business Machines Corporation | Apparatus, system, and method for database provisioning |
US7386758B2 (en) | 2005-01-13 | 2008-06-10 | Hitachi, Ltd. | Method and apparatus for reconstructing data in object-based storage arrays |
US7305579B2 (en) * | 2005-03-22 | 2007-12-04 | Xiotech Corporation | Method, apparatus and program storage device for providing intelligent rebuild order selection |
US7672930B2 (en) | 2005-04-05 | 2010-03-02 | Wal-Mart Stores, Inc. | System and methods for facilitating a linear grid database with data organization by dimension |
US7574623B1 (en) * | 2005-04-29 | 2009-08-11 | Network Appliance, Inc. | Method and system for rapidly recovering data from a “sick” disk in a RAID disk group |
US8190588B1 (en) * | 2005-09-19 | 2012-05-29 | Amazon Technologies, Inc. | Providing a distributed transaction information storage service |
US7574579B2 (en) | 2005-09-30 | 2009-08-11 | Cleversafe, Inc. | Metadata management system for an information dispersed storage system |
US7904475B2 (en) | 2007-10-09 | 2011-03-08 | Cleversafe, Inc. | Virtualized data storage vaults on a dispersed data storage network |
US8171101B2 (en) | 2005-09-30 | 2012-05-01 | Cleversafe, Inc. | Smart access to a dispersed data storage network |
US7546427B2 (en) | 2005-09-30 | 2009-06-09 | Cleversafe, Inc. | System for rebuilding dispersed data |
US8285878B2 (en) | 2007-10-09 | 2012-10-09 | Cleversafe, Inc. | Block based access to a dispersed data storage network |
US7574570B2 (en) | 2005-09-30 | 2009-08-11 | Cleversafe Inc | Billing system for information dispersal system |
US7953937B2 (en) | 2005-09-30 | 2011-05-31 | Cleversafe, Inc. | Systems, methods, and apparatus for subdividing data for storage in a dispersed data storage grid |
EP1798934A1 (en) * | 2005-12-13 | 2007-06-20 | Deutsche Thomson-Brandt Gmbh | Method and apparatus for organizing nodes in a network |
US20070214285A1 (en) | 2006-03-08 | 2007-09-13 | Omneon Video Networks | Gateway server |
US7386827B1 (en) * | 2006-06-08 | 2008-06-10 | Xilinx, Inc. | Building a simulation environment for a design block |
US9697171B2 (en) * | 2007-10-09 | 2017-07-04 | Internaitonal Business Machines Corporation | Multi-writer revision synchronization in a dispersed storage network |
US9084937B2 (en) * | 2008-11-18 | 2015-07-21 | Gtech Canada Ulc | Faults and performance issue prediction |
US8260750B1 (en) * | 2009-03-16 | 2012-09-04 | Quest Software, Inc. | Intelligent backup escalation system |
US10395054B2 (en) | 2011-06-06 | 2019-08-27 | Pure Storage, Inc. | Updating distributed storage network software |
US9256560B2 (en) * | 2009-07-29 | 2016-02-09 | Solarflare Communications, Inc. | Controller integration |
US9558059B2 (en) * | 2009-07-30 | 2017-01-31 | International Business Machines Corporation | Detecting data requiring rebuilding in a dispersed storage network |
US9661356B2 (en) * | 2009-10-29 | 2017-05-23 | International Business Machines Corporation | Distribution of unique copies of broadcast data utilizing fault-tolerant retrieval from dispersed storage |
US9098376B2 (en) * | 2009-10-30 | 2015-08-04 | Cleversafe, Inc. | Distributed storage network for modification of a data object |
US8458233B2 (en) * | 2009-11-25 | 2013-06-04 | Cleversafe, Inc. | Data de-duplication in a dispersed storage network utilizing data characterization |
US9152489B2 (en) * | 2009-12-29 | 2015-10-06 | Cleversafe, Inc. | Revision synchronization of a dispersed storage network |
US8990585B2 (en) * | 2009-12-29 | 2015-03-24 | Cleversafe, Inc. | Time based dispersed storage access |
US8954667B2 (en) * | 2010-01-28 | 2015-02-10 | Cleversafe, Inc. | Data migration in a dispersed storage network |
US10447767B2 (en) * | 2010-04-26 | 2019-10-15 | Pure Storage, Inc. | Resolving a performance issue within a dispersed storage network |
US9092386B2 (en) * | 2010-04-26 | 2015-07-28 | Cleversafe, Inc. | Indicating an error within a dispersed storage network |
US9898373B2 (en) * | 2010-04-26 | 2018-02-20 | International Business Machines Corporation | Prioritizing rebuilding of stored data in a dispersed storage network |
US8521697B2 (en) * | 2010-05-19 | 2013-08-27 | Cleversafe, Inc. | Rebuilding data in multiple dispersed storage networks |
US9311615B2 (en) * | 2010-11-24 | 2016-04-12 | International Business Machines Corporation | Infrastructure asset management |
KR101758883B1 (ko) * | 2011-01-10 | 2017-07-31 | 스토론 리미티드 | 라지 스케일 스토리지 시스템 |
US8996910B2 (en) * | 2011-05-09 | 2015-03-31 | Cleversafe, Inc. | Assigning a dispersed storage network address range in a maintenance free storage container |
US10042709B2 (en) * | 2011-06-06 | 2018-08-07 | International Business Machines Corporation | Rebuild prioritization during a plurality of concurrent data object write operations |
US9521725B2 (en) * | 2011-07-26 | 2016-12-13 | Hunter Industries, Inc. | Systems and methods for providing power and data to lighting devices |
US9135098B2 (en) * | 2011-07-27 | 2015-09-15 | Cleversafe, Inc. | Modifying dispersed storage network event records |
US8549518B1 (en) * | 2011-08-10 | 2013-10-01 | Nutanix, Inc. | Method and system for implementing a maintenanece service for managing I/O and storage for virtualization environment |
US9785491B2 (en) * | 2011-10-04 | 2017-10-10 | International Business Machines Corporation | Processing a certificate signing request in a dispersed storage network |
US9304857B2 (en) * | 2011-12-12 | 2016-04-05 | Cleversafe, Inc. | Retrieving data from a distributed storage network |
US9146810B2 (en) * | 2012-01-31 | 2015-09-29 | Cleversafe, Inc. | Identifying a potentially compromised encoded data slice |
US8719320B1 (en) * | 2012-03-29 | 2014-05-06 | Amazon Technologies, Inc. | Server-side, variable drive health determination |
US9380032B2 (en) * | 2012-04-25 | 2016-06-28 | International Business Machines Corporation | Encrypting data for storage in a dispersed storage network |
US9164841B2 (en) * | 2012-06-05 | 2015-10-20 | Cleversafe, Inc. | Resolution of a storage error in a dispersed storage network |
US9761229B2 (en) * | 2012-07-20 | 2017-09-12 | Qualcomm Incorporated | Systems, methods, apparatus, and computer-readable media for audio object clustering |
US20140101298A1 (en) * | 2012-10-05 | 2014-04-10 | Microsoft Corporation | Service level agreements for a configurable distributed storage system |
US9811533B2 (en) * | 2012-12-05 | 2017-11-07 | International Business Machines Corporation | Accessing distributed computing functions in a distributed computing system |
US10055441B2 (en) * | 2013-02-05 | 2018-08-21 | International Business Machines Corporation | Updating shared group information in a dispersed storage network |
US9679615B2 (en) * | 2013-03-15 | 2017-06-13 | Micron Technology, Inc. | Flexible memory system with a controller and a stack of memory |
US9626125B2 (en) * | 2013-07-31 | 2017-04-18 | International Business Machines Corporation | Accounting for data that needs to be rebuilt or deleted |
US9720758B2 (en) * | 2013-09-11 | 2017-08-01 | Dell Products, Lp | Diagnostic analysis tool for disk storage engineering and technical support |
US9264494B2 (en) * | 2013-10-21 | 2016-02-16 | International Business Machines Corporation | Automated data recovery from remote data object replicas |
US9900316B2 (en) * | 2013-12-04 | 2018-02-20 | International Business Machines Corporation | Accessing storage units of a dispersed storage network |
US9435101B2 (en) * | 2014-04-24 | 2016-09-06 | Topcon Positioning Systems, Inc. | Semi-automatic control of a joystick for dozer blade control |
US9075773B1 (en) * | 2014-05-07 | 2015-07-07 | Igneous Systems, Inc. | Prioritized repair of data storage failures |
US20150356305A1 (en) * | 2014-06-05 | 2015-12-10 | Cleversafe, Inc. | Secure data access in a dispersed storage network |
US20160028419A1 (en) * | 2014-07-22 | 2016-01-28 | Lsi Corporation | Systems and Methods for Rank Independent Cyclic Data Encoding |
US10120739B2 (en) * | 2014-12-02 | 2018-11-06 | International Business Machines Corporation | Prioritized data rebuilding in a dispersed storage network |
US10078472B2 (en) * | 2015-02-27 | 2018-09-18 | International Business Machines Corporation | Rebuilding encoded data slices in a dispersed storage network |
US10079887B2 (en) * | 2015-03-31 | 2018-09-18 | International Business Machines Corporation | Expanding storage capacity of a set of storage units in a distributed storage network |
US10601658B2 (en) * | 2015-04-08 | 2020-03-24 | Cisco Technology, Inc. | Maintenance of consumable physical components of a network |
US10067998B2 (en) * | 2015-04-30 | 2018-09-04 | International Business Machines Corporation | Distributed sync list |
US10528540B2 (en) * | 2015-05-11 | 2020-01-07 | AtScale, Inc. | Dynamic aggregate generation and updating for high performance querying of large datasets |
US10410135B2 (en) * | 2015-05-21 | 2019-09-10 | Software Ag Usa, Inc. | Systems and/or methods for dynamic anomaly detection in machine sensor data |
EP4002759A1 (en) * | 2018-01-16 | 2022-05-25 | Nchain Holdings Limited | Computer implemented method and system for obtaining digitally signed data |
-
2017
- 2017-01-04 US US15/398,540 patent/US10089178B2/en active Active
- 2017-01-09 US US15/401,377 patent/US20170249228A1/en not_active Abandoned
- 2017-01-10 US US15/402,378 patent/US10248505B2/en active Active
- 2017-01-11 US US15/403,425 patent/US10476849B2/en active Active
- 2017-01-12 US US15/404,560 patent/US20170249212A1/en not_active Abandoned
- 2017-01-19 US US15/410,329 patent/US10326740B2/en not_active Expired - Fee Related
- 2017-02-06 US US15/425,553 patent/US10120757B2/en not_active Expired - Fee Related
- 2017-02-07 US US15/426,380 patent/US10678622B2/en active Active
- 2017-02-22 CN CN201780008333.0A patent/CN108701197A/zh active Pending
- 2017-02-22 US US15/439,092 patent/US10824495B2/en active Active
- 2017-02-22 WO PCT/IB2017/051010 patent/WO2017149410A1/en active Application Filing
- 2017-02-22 DE DE112017000220.6T patent/DE112017000220T5/de not_active Withdrawn
-
2018
- 2018-06-26 US US16/019,505 patent/US10673828B2/en active Active
-
2020
- 2020-04-24 US US16/857,719 patent/US11204822B1/en active Active
-
2021
- 2021-11-30 US US17/538,771 patent/US11704184B2/en active Active
-
2023
- 2023-06-08 US US18/331,283 patent/US20230315557A1/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101166089A (zh) * | 2006-10-18 | 2008-04-23 | 株式会社东芝 | 秘密信息管理设备与秘密信息管理系统 |
US9203812B2 (en) * | 2009-04-20 | 2015-12-01 | Cleversafe, Inc. | Dispersed storage network with encrypted portion withholding and methods for use therewith |
US8885821B2 (en) * | 2010-01-28 | 2014-11-11 | Cleversafe, Inc. | Sequencing encoded data slices |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111813331A (zh) * | 2019-04-10 | 2020-10-23 | 阿里巴巴集团控股有限公司 | 用于操作数据存储系统的方法、系统和非暂时性计算机可读介质 |
CN110058820A (zh) * | 2019-04-23 | 2019-07-26 | 武汉汇迪森信息技术有限公司 | 基于固态盘阵列的数据安全写入、删除、读取方法及装置 |
CN112468494A (zh) * | 2020-11-26 | 2021-03-09 | 湖北航天信息技术有限公司 | 一种内外网互联网数据传输方法及装置 |
CN112764677A (zh) * | 2021-01-14 | 2021-05-07 | 杭州电子科技大学 | 一种在云存储中增强数据迁移安全性的方法 |
CN114785484A (zh) * | 2022-04-06 | 2022-07-22 | 河南省怡之发电子科技有限公司 | 一种大数据安全传输方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
US20180307561A1 (en) | 2018-10-25 |
US20170250809A1 (en) | 2017-08-31 |
US20170249205A1 (en) | 2017-08-31 |
US20170249212A1 (en) | 2017-08-31 |
US10678622B2 (en) | 2020-06-09 |
US20170249228A1 (en) | 2017-08-31 |
WO2017149410A1 (en) | 2017-09-08 |
US10673828B2 (en) | 2020-06-02 |
US20170249084A1 (en) | 2017-08-31 |
US10248505B2 (en) | 2019-04-02 |
US20170249203A1 (en) | 2017-08-31 |
US20230315557A1 (en) | 2023-10-05 |
US11704184B2 (en) | 2023-07-18 |
US11204822B1 (en) | 2021-12-21 |
US10326740B2 (en) | 2019-06-18 |
US20170249551A1 (en) | 2017-08-31 |
US20170249086A1 (en) | 2017-08-31 |
DE112017000220T5 (de) | 2018-08-09 |
US20170250965A1 (en) | 2017-08-31 |
US20220083415A1 (en) | 2022-03-17 |
US10120757B2 (en) | 2018-11-06 |
US10824495B2 (en) | 2020-11-03 |
US10476849B2 (en) | 2019-11-12 |
US10089178B2 (en) | 2018-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108701197A (zh) | 高效的秘密密钥加密的安全切片 | |
US10613776B2 (en) | Appyling multiple hash functions to generate multiple masked keys in a secure slice implementation | |
US10656998B2 (en) | End-to-end secure data storage in a dispersed storage network | |
US11036392B2 (en) | Determining when to use convergent encryption | |
US10095441B2 (en) | End-to-end secure data retrieval in a dispersed storage network | |
US20170286239A1 (en) | Migrating data slices within a dispersed storage network | |
US10693640B2 (en) | Use of key metadata during write and read operations in a dispersed storage network memory | |
US20170019253A1 (en) | Decrypting segmented data in a distributed computing system | |
US10642992B2 (en) | Password augmented all-or-nothin transform | |
US20190005261A1 (en) | Secure shared vault with encrypted private indices | |
US10650160B2 (en) | Enhancing security for multiple storage configurations | |
US10901650B2 (en) | Using a master encryption key to sanitize a dispersed storage network memory | |
CN110419029A (zh) | 在分布式存储网络中部分更新数据内容的方法 | |
US11336428B1 (en) | Blinded passwords for a distributed storage system | |
US11895098B2 (en) | Storing encrypted chunksets of data in a vast storage network | |
US10853171B2 (en) | Encoding data in a dispersed storage network | |
US10360391B2 (en) | Verifiable keyed all-or-nothing transform | |
US11360851B2 (en) | Duplicating authentication information between connections | |
US10223213B2 (en) | Salted zero expansion all or nothing transformation | |
US20220012123A1 (en) | Encoding Data and Associated Metadata in a Storage Network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181023 |