Conserving file system with backup and validation
First Claim
1. A hierarchical data storage and retrieval system for reducing the amount of stored data and retrieval time, comprising:
- a processor;
data and program storage accessible by said processor, said storage comprising one or more data storage devices; and
computer readable instructions located to said program storage, wherein said instructions are configured to be executed by said processor to perform the functions of;
(i) receiving requests to store pieces of data, those requests including a file name, (ii) for a received request to store a piece of data, computing a signature for the content the piece of data, wherein the signature is substantially statistically unique, (iii) checking for the existence of a computed signature corresponding to another piece of data stored to said data storage, (iv) if in said checking a corresponding existing signature is not found, storing the requested piece of data to said data storage addressable by the computed signature, and further cataloging the requested piece of data by the requested file name and assigning to a counter a count corresponding to one instance, (v) if in said checking a corresponding existing signature is found, cataloging an existing piece of data stored to said data storage, if one exists, and incrementing a counter storing an instance count, (vi) receiving requests to modify or delete pieces of data, those requests including a file name, (vii) for a received request to modify or delete a piece of data, identifying the stored piece of data cataloged by the received file name, (viii) for the identified piece of data, decrementing a counter storing an instance count, and (ix) if in said decrementing the counter indicates zero instances of a piece of data, deleting that piece of data from storage and its corresponding catalog entry.
10 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein is a hierarchical data storage and retrieval system implemented using a computed statistically unique signature for the content of given computer data as its basis. The data storage and retrieval system can be used to catalog computer information for easy indexing and retrieval. The signature is computed by any number of techniques so long as it is able to produce a statistically unique signature, one example being the SHA-1 algorithm. The system is able to reduce the amount of data that is stored and the time required for retrieving the data. Provide a way to move electronic data in an encrypted secure manner that requires the complete data set being moved for decryption of the data. Even if a portion of the data is compromised that portion would still remain secure. The data is encrypted and separated into two or more portions all of which would be needed to decrypt the data. Detailed information on various example embodiments of the inventions are provided in the Detailed Description below, and the inventions are defined by the appended claims.
129 Citations
2 Claims
-
1. A hierarchical data storage and retrieval system for reducing the amount of stored data and retrieval time, comprising:
-
a processor;
data and program storage accessible by said processor, said storage comprising one or more data storage devices; and
computer readable instructions located to said program storage, wherein said instructions are configured to be executed by said processor to perform the functions of;
(i) receiving requests to store pieces of data, those requests including a file name, (ii) for a received request to store a piece of data, computing a signature for the content the piece of data, wherein the signature is substantially statistically unique, (iii) checking for the existence of a computed signature corresponding to another piece of data stored to said data storage, (iv) if in said checking a corresponding existing signature is not found, storing the requested piece of data to said data storage addressable by the computed signature, and further cataloging the requested piece of data by the requested file name and assigning to a counter a count corresponding to one instance, (v) if in said checking a corresponding existing signature is found, cataloging an existing piece of data stored to said data storage, if one exists, and incrementing a counter storing an instance count, (vi) receiving requests to modify or delete pieces of data, those requests including a file name, (vii) for a received request to modify or delete a piece of data, identifying the stored piece of data cataloged by the received file name, (viii) for the identified piece of data, decrementing a counter storing an instance count, and (ix) if in said decrementing the counter indicates zero instances of a piece of data, deleting that piece of data from storage and its corresponding catalog entry.
-
-
2. A method for securing storing and moving media comprising the following steps:
-
receiving source data, breaking said source data into separate data chunks, encrypting said data chunks with a unique key for each of said chunks, and storing said encrypted data and said keys in separate locations.
-
Specification