Data storage and/or retrieval
First Claim
Patent Images
1. In a system including a first layer, a second layer and a third layer, a method comprising:
- writing data in any order, said first layer having made a write request;
wherein said second layer is capable of performing services including encryption and said third layer is capable of performing services including data storage, said encryption being transparent to said third layer.
3 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of methods, devices and/or systems for data storage and/or retrieval are described.
72 Citations
67 Claims
-
1. In a system including a first layer, a second layer and a third layer, a method comprising:
-
writing data in any order, said first layer having made a write request;
wherein said second layer is capable of performing services including encryption and said third layer is capable of performing services including data storage, said encryption being transparent to said third layer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. In a system including a first layer, a second layer and a third layer, a method comprising:
-
reading data in any order;
said first layer having made a read request;
wherein said second layer is capable of performing services including decryption and said third layer is capable of performing services including data storage, said decryption being transparent to said third layer; and
the data being read comprising, at least sometimes, a default data pattern. - View Dependent Claims (21, 22, 23, 24, 25)
-
-
26. For a system including a first layer, a second layer and a third layer, an article comprising:
- a storage medium having stored thereon instructions, that, when executed by said system, results in;
writing data in any order, said first layer having made a write request;
wherein said second layer is capable of performing services including encryption and said third layer is capable of performing services including data storage, said encryption being transparent to said third layer. - View Dependent Claims (27, 28, 29, 30, 31, 32, 34)
- a storage medium having stored thereon instructions, that, when executed by said system, results in;
-
33. The article of 30, wherein said article further comprises instructions that, when executed, further result in:
- said writing data in any order further comprising changing the encryption key of said second layer if said encrypted data includes said default data pattern.
-
35. The article of 34, wherein said article further comprises instructions that, when executed, further result in:
- if said data being read comprises said default data pattern, said different decryption method comprises said data being read to said first layer without performing decryption.
-
36. The article of 28, wherein said article further comprises instructions that, when executed, further result in:
- said default data pattern comprising data read from locations to which data has not yet been written.
-
37. The article of 36, wherein said article further comprises instructions that, when executed, further result in:
- said default data pattern comprising a fixed pattern.
-
38. The article of 26, wherein said article further comprises instructions that, when executed, further result in:
- said writing data in any order comprising writing data to a file in data segments, the data segments being written in any order.
-
39. For a system including a first layer, a second layer and a third layer, an article comprising:
- a storage medium having stored thereon instructions, that, when executed by said system, results in;
reading data in any order;
said first layer having made the read request;
wherein said second layer is capable of performing services including decryption and said third layer is capable of performing services including data storage, said encryption being transparent to said third layer; and
the data being read comprising, at least sometimes, a default data pattern. - View Dependent Claims (40, 41, 42, 43)
- a storage medium having stored thereon instructions, that, when executed by said system, results in;
-
44. A method of operating a computing platform comprising:
-
encrypting data prior to storing it on said computing platform;
wherein encrypting data includes providing for, at least sometimes, at least one hole in said data. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51)
-
-
52. A method of operating a computing platform comprising:
-
decrypting stored encrypted data prior to providing said stored data to a device external to said computing platform;
wherein decrypting includes, at least sometimes, filling at least one hole in said stored data. - View Dependent Claims (53, 54, 55, 56, 57)
-
-
58. An apparatus comprising:
- a network, said network comprising a system including a first layer, a second layer and a third layer;
said system being capable of writing data in any order, once said first layer has made a write request;
wherein said second layer is capable of performing services including encryption and said third layer is capable of performing services including data storage, said encryption to be performed by said second layer capable of being transparent to said third layer. - View Dependent Claims (59, 60, 61, 62, 63, 64, 65, 66, 67)
- a network, said network comprising a system including a first layer, a second layer and a third layer;
Specification