Encoding data in a dispersed storage network
First Claim
1. A method for execution by an integrity processing unit that includes a processor, the method comprises:
- performing a deterministic function on data for storage to produce an integrity value;
combining the data and the integrity value in accordance with a combining function to produce a data package;
determining whether to encrypt the data package;
determining an encryption approach in response to determining to encrypt the data package;
encrypting the data package in accordance with the encryption approach to produce a secure package;
encoding the secure package to produce a set of slices;
decoding the set of slices to reproduce the secure package;
identifying the encryption approach associated with the secure package;
decrypting the secure package in accordance with the encryption approach to reproduce the data package;
de-combining the data package in accordance with the combining function to generate reproduced data and a received integrity value;
performing the deterministic function on the data to produce a calculated integrity value; and
generating a validity indicator of the reproduced data based on a comparison of the received integrity value and the calculated integrity value.
3 Assignments
0 Petitions
Accused Products
Abstract
A method for execution by an integrity processing unit includes performing a deterministic function on data for storage to produce an integrity value. The data and the integrity value are combined in accordance with a combining function to produce a data package. The processing system determines an encryption approach in response to determining to encrypt the data package. The data package is encrypted in accordance with the encryption approach to produce a secure package. The secure package is encoded to produce a set of slices. The set of slices is decoded to reproduce the secure package. The secure package is decrypted to reproduce the data package. The data package is de-combined in to generate reproduced data and a received integrity value. The deterministic function is performed on the data to produce a calculated integrity value, and the received integrity value is compared to the calculated integrity value.
87 Citations
20 Claims
-
1. A method for execution by an integrity processing unit that includes a processor, the method comprises:
-
performing a deterministic function on data for storage to produce an integrity value; combining the data and the integrity value in accordance with a combining function to produce a data package; determining whether to encrypt the data package; determining an encryption approach in response to determining to encrypt the data package; encrypting the data package in accordance with the encryption approach to produce a secure package; encoding the secure package to produce a set of slices; decoding the set of slices to reproduce the secure package; identifying the encryption approach associated with the secure package; decrypting the secure package in accordance with the encryption approach to reproduce the data package; de-combining the data package in accordance with the combining function to generate reproduced data and a received integrity value; performing the deterministic function on the data to produce a calculated integrity value; and generating a validity indicator of the reproduced data based on a comparison of the received integrity value and the calculated integrity value. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A processing system of an integrity processing unit comprises:
-
at least one processor; a memory that stores operational instructions, that when executed by the at least one processor cause the processing system to; perform a deterministic function on data for storage to produce an integrity value; combine the data and the integrity value in accordance with a combining function to produce a data package; determine whether to encrypt the data package; determine an encryption approach in response to determining to encrypt the data package; encrypt the data package in accordance with the encryption approach to produce a secure package; encode the secure package to produce a set of slices; decode the set of slices to reproduce the secure package; identify the encryption approach associated with the secure package; decrypt the secure package in accordance with the encryption approach to reproduce the data package; de-combine the data package in accordance with the combining function to generate reproduced data and a received integrity value; perform the deterministic function on the data to produce a calculated integrity value; and generate a validity indicator of the reproduced data based on a comparison of the received integrity value and the calculated integrity value. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A computer readable storage medium comprises:
-
at least one memory section that stores operational instructions that, when executed by a processing system of a dispersed storage network (DSN) that includes a processor and a memory, causes the processing system to; perform a deterministic function on data for storage to produce an integrity value; combine the data and the integrity value in accordance with a combining function to produce a data package; determine whether to encrypt the data package; determine an encryption approach in response to determining to encrypt the data package; encrypt the data package in accordance with the encryption approach to produce a secure package; encode the secure package to produce a set of slices; decode the set of slices to reproduce the secure package; identify the encryption approach associated with the secure package; decrypt the secure package in accordance with the encryption approach to reproduce the data package; de-combine the data package in accordance with the combining function to generate reproduced data and a received integrity value; perform the deterministic function on the data to produce a calculated integrity value; and generate a validity indicator of the reproduced data based on a comparison of the received integrity value and the calculated integrity value.
-
Specification