Systems and methods for quorum-based data recovery
First Claim
Patent Images
1. A computer-implemented method of quorum-based data recovery, comprising:
- receiving, by a plurality of computing devices associated with respective users of available participants over a data network within the secured computing environment, at least a predetermined minimum number of quorum portions generated from original data, identifying a majority symbol at each position of the received quorum data which is the symbol with the greatest number of occurrences at a particular position across all of the received quorum data, wherein each quorum portion includes a corrupted data value at a respective defined position in the original data distributed in the sequence of symbols; and
reconstructing the original data from the received quorum portions, wherein the original data is reconstructed from a majority data value at each respective defined position of the received quorum portions, wherein the original data is a secret key for encrypting or decrypting data within the secured computing environment.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure includes systems and methods for quorum-based data recovery, in which data is recovered provided at least a minimum number of quorum data portions are presented. In exemplary embodiments, a predetermined minimum number of versions of original data is received, and the original data is reconstructed from the received versions, wherein the original data cannot be reconstructed without loss unless a predetermined minimum number of versions is received. In other embodiments, erroneous or corrupted quorum data portions are detected and associated participants presenting said erroneous or corrupted quorum data portions are identified.
24 Citations
19 Claims
-
1. A computer-implemented method of quorum-based data recovery, comprising:
-
receiving, by a plurality of computing devices associated with respective users of available participants over a data network within the secured computing environment, at least a predetermined minimum number of quorum portions generated from original data, identifying a majority symbol at each position of the received quorum data which is the symbol with the greatest number of occurrences at a particular position across all of the received quorum data, wherein each quorum portion includes a corrupted data value at a respective defined position in the original data distributed in the sequence of symbols; and reconstructing the original data from the received quorum portions, wherein the original data is reconstructed from a majority data value at each respective defined position of the received quorum portions, wherein the original data is a secret key for encrypting or decrypting data within the secured computing environment. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising one or more processors processing circuits configured to perform quorum-based data recovery by:
-
receiving, by a plurality of computing devices associated with respective users of available participants over a data network within the secured computing environment, at least a predetermined minimum number of quorum portions generated from original data, wherein each quorum portion comprises one or more data values each identifying a solution to a respective one of a series of equations that encode dependencies between data values of the original data, wherein each equation is associated with a single unknown dependent data value; and determining reconstructed data from the received plurality of quorum portions, using a series of reconstruction equations each associated with a single unknown value of candidate data, wherein the reconstructed data includes data values corresponding to the original data and data values corresponding to the plurality of quorum portions generated from said original data, wherein the original data is a secret key for encrypting or decrypting data within the secured computing environment. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory storage medium comprising machine-readable instructions stored
thereon for causing a computer system to perform a method of quorum-based data recovery by: -
receiving, by a plurality of computing devices in the computer system associated with respective users of available participants over a data network within the secured computing environment, at least a predetermined minimum number of quorum portions generated from original data, identifying a majority symbol at each position of the received quorum data which is the symbol with the greatest number of occurrences at a particular position across all of the received quorum data, wherein each quorum portion includes a corrupted data value at a respective defined position in the original data distributed in the sequence of symbols; and reconstructing the original data from the received quorum portions, wherein the original data is reconstructed from a majority data value at each respective defined position of the received quorum portions, wherein the original data is a secret key for encrypting or decrypting data within the secured computing environment.
-
Specification