Dispersed data storage system data decoding and decryption
First Claim
Patent Images
1. A method for execution by a processing module, the method comprises:
- receiving, via a network interface, error coded data;
decoding the error coded data using an error coding scheme to produce transformed data;
partitioning the transformed data into an encoded encryption key for decoding encrypted data included in the transformed data and the encrypted data;
performing a hash function on the encrypted data to produce a digest resultant;
combining the digest resultant with the encoded encryption key to generate combined key data;
decoding the combined key data to recover an encryption key; and
decrypting the encrypted data using the encryption key to recover data.
5 Assignments
0 Petitions
Accused Products
Abstract
A computing system retrieves securely stored encrypted and encoded data from a dispersed data storage system. The computing system includes a processing module and a plurality of storage units. The processing module includes an error decoder and a decryptor and to decode and decrypt the encrypted and encoded data retrieved from the dispersed data storage system utilizing a read command to the storage units. The storage units retrieve the encrypted and encoded data and send the encrypted and encoded data to the processing module when receiving the read command.
112 Citations
10 Claims
-
1. A method for execution by a processing module, the method comprises:
-
receiving, via a network interface, error coded data; decoding the error coded data using an error coding scheme to produce transformed data; partitioning the transformed data into an encoded encryption key for decoding encrypted data included in the transformed data and the encrypted data; performing a hash function on the encrypted data to produce a digest resultant; combining the digest resultant with the encoded encryption key to generate combined key data; decoding the combined key data to recover an encryption key; and decrypting the encrypted data using the encryption key to recover data. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computing device comprises:
-
a processing module; memory operably coupled to the processing module; and an input/output (TO) port operably coupled to receive error coded data, wherein the processing module is operably coupled to; decode the error coded data using an error coding scheme to produce transformed data; partition the transformed data into an encoded encryption key for decoding encrypted data included in the transformed data and the encrypted data; perform a hash function on the encrypted data to produce a digest resultant; combine the digest resultant with the encoded encryption key to generate combined key data; decode the combined key data to recover an encryption key; and decrypt the encrypted data using the encryption key to recover data. - View Dependent Claims (7, 8, 9, 10)
-
Specification