Systems and methods for quorum-based data recovery
First Claim
1. A computer-implemented method of quorum-based data recovery, by a quorum system in communication with a plurality of computing devices via a data network, the computing devices associated with respective users that are entities authorized to participate as quorum members, the method comprising:
- receiving, from the plurality of computing devices by the quorum system, at least a predetermined minimum number of quorum portions generated from original data using a secret key that is partitioned into a plurality of key components, wherein each received quorum portion comprises;
at least one ciphertext portion defining a received set of ciphertext portions generated by encrypting the original data using a partial encryption key formed from a corresponding defined combination of said key components; and
at least one received key component of said plurality of key components, wherein the at least one received key component was not included in the defined combination of key components of the partial key used to generate the set of ciphertext portions of the corresponding received quorum portion;
identifying the plurality of received key components from the received quorum portions;
determining a plurality of candidate combinations of the identified received key components, each candidate combination forming a candidate partial key, and wherein each candidate combination corresponds to a defined set of ciphertext portions;
identifying and decrypting, for the defined set of ciphertext portions of each candidate partial key, the corresponding at least one ciphertext portion from the received quorum portions, using the respective candidate partial key; and
determining that at least one candidate partial key is a legitimate partial key to recover the original data by verifying received quorum portions that are correct and received purported quorum portions that include errors from the corresponding decrypted at least one ciphertext portion.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure includes systems and methods for quorum-based data recovery, in which data is recovered provided at least a minimum number of quorum data portions are presented. In exemplary embodiments, a predetermined minimum number of versions of original data is received, and the original data is reconstructed from the received versions, wherein the original data cannot be reconstructed without loss unless a predetermined minimum number of versions is received. In other embodiments, erroneous or corrupted quorum data portions are detected and associated participants presenting said erroneous or corrupted quorum data portions are identified.
-
Citations
23 Claims
-
1. A computer-implemented method of quorum-based data recovery, by a quorum system in communication with a plurality of computing devices via a data network, the computing devices associated with respective users that are entities authorized to participate as quorum members, the method comprising:
-
receiving, from the plurality of computing devices by the quorum system, at least a predetermined minimum number of quorum portions generated from original data using a secret key that is partitioned into a plurality of key components, wherein each received quorum portion comprises; at least one ciphertext portion defining a received set of ciphertext portions generated by encrypting the original data using a partial encryption key formed from a corresponding defined combination of said key components; and at least one received key component of said plurality of key components, wherein the at least one received key component was not included in the defined combination of key components of the partial key used to generate the set of ciphertext portions of the corresponding received quorum portion; identifying the plurality of received key components from the received quorum portions; determining a plurality of candidate combinations of the identified received key components, each candidate combination forming a candidate partial key, and wherein each candidate combination corresponds to a defined set of ciphertext portions; identifying and decrypting, for the defined set of ciphertext portions of each candidate partial key, the corresponding at least one ciphertext portion from the received quorum portions, using the respective candidate partial key; and determining that at least one candidate partial key is a legitimate partial key to recover the original data by verifying received quorum portions that are correct and received purported quorum portions that include errors from the corresponding decrypted at least one ciphertext portion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A quorum system comprising one or more processors in communication with a plurality of computing devices, each computing device associated with respective users that are entities authorized to participate as quorum members for quorum-based data recovery, the system configured to:
-
receive, from the plurality of computing devices, at least a predetermined minimum number of quorum portions generated from original data using a secret key that is partitioned into a plurality of key components, wherein each received quorum portion comprises; at least one ciphertext portion defining a received set of ciphertext portions generated by encrypting the original data using a partial key formed from a corresponding defined combination of said key components; and at least one received key component of said plurality of key components, wherein the at least one received key component was not included in the defined combination of key components of the partial key used to generate the set of ciphertext portions of the corresponding received quorum portion; determine a plurality of candidate combinations of the identified received key components, each candidate combination forming a candidate partial key, and wherein each candidate combination corresponds to a defined set of ciphertext portions; identify and decrypt, for the defined set of ciphertext portions of each candidate partial key, the corresponding at least one received ciphertext portion from the received quorum portions, using the respective candidate partial key; and determine that at least one candidate partial key is a legitimate partial key to recover the original data by verifying received quorum portions that are correct and received quorum portions that include errors from the corresponding decrypted at least one ciphertext portion.
-
-
23. A non-transitory computer-readable medium comprising computer-executable instructions that, when executed, perform a method of quorum-based data recovery, by a quorum system in communication with a plurality of computing devices via a data network, the computing devices associated with respective users that are entities authorized to participate as quorum members, comprising:
-
receiving, from the plurality of computing devices by the quorum system, at least a predetermined minimum number of quorum portions generated from original data using a secret key that is partitioned into a plurality of key components, wherein each received quorum portion comprises; at least one ciphertext portion defining a received set of ciphertext portions generated by encrypting the original data using a partial encryption key formed from a corresponding defined combination of said key components; and at least one received key component of said plurality of key components, wherein the at least one received key component was not included in the defined combination of key components of the partial key used to generate the set of ciphertext portions of the corresponding received quorum portion; identifying the plurality of received key components from the received quorum portions; determining a plurality of candidate combinations of the identified received key components, each candidate combination forming a candidate partial key, and wherein each candidate combination corresponds to a defined set of ciphertext portions; identifying and decrypting, for the defined set of ciphertext portions of each candidate partial key, the corresponding at least one ciphertext portion from the received quorum portions, using the respective candidate partial key; and determining that at least one candidate partial key is a legitimate partial key to recover the original data by verifying received quorum portions that are correct and received purported quorum portions that include errors from the corresponding decrypted at least one ciphertext portion.
-
Specification