Protocol for Verifying Integrity of Remote Data
First Claim
1. A method for verifying the integrity of remotely stored data, the method comprising:
- providing a key;
providing a fingerprint, the fingerprint generated using the key in a keyed cryptographic hash function as applied to data of known integrity;
sending the key to a remote storage location that stores a copy of the data of known integrity;
receiving a fingerprint from the remote storage location, the fingerprint generated using the key in a keyed cryptographic hash function as applied to the remotely stored copy of the data; and
verifying the integrity of the remotely stored copy of the data based at least in part on comparing the provided fingerprint to the received fingerprint.
2 Assignments
0 Petitions
Accused Products
Abstract
An exemplary method for verifying the integrity of remotely stored data includes providing a key; providing a fingerprint, the fingerprint generated using the key in a keyed cryptographic hash function as applied to data of known integrity; sending the key to a remote storage location that stores a copy of the data of known integrity; receiving a fingerprint from the remote storage location, the fingerprint generated using the key in a keyed cryptographic hash function as applied to the remotely stored copy of the data; and verifying the integrity of the remotely stored copy of the data based at least in part on comparing the provided fingerprint to the received fingerprint. Other exemplary methods, systems, etc., are also disclosed.
36 Citations
24 Claims
-
1. A method for verifying the integrity of remotely stored data, the method comprising:
-
providing a key; providing a fingerprint, the fingerprint generated using the key in a keyed cryptographic hash function as applied to data of known integrity; sending the key to a remote storage location that stores a copy of the data of known integrity; receiving a fingerprint from the remote storage location, the fingerprint generated using the key in a keyed cryptographic hash function as applied to the remotely stored copy of the data; and verifying the integrity of the remotely stored copy of the data based at least in part on comparing the provided fingerprint to the received fingerprint. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computing device comprising:
-
one or more processors; memory to store a key and a fingerprint generated using the key in a keyed cryptographic hash function as applied to data of known integrity; and components comprising instructions to send the key to a remote storage location that stores a copy of the data of known integrity;
to receive a fingerprint from the remote storage location, the fingerprint generated using the key in a keyed cryptographic hash function as applied to the remotely stored copy of the data; and
to verify the integrity of the remotely stored copy of the data based at least in part on comparing the provided fingerprint to the received fingerprint. - View Dependent Claims (14, 15)
-
-
16. A peer-to-peer system comprising:
a computing device configured to; store data locally wherein the locally stored data comprises data owned by a local owner and a copy of data owned by a remote owner; to receive a key associated with the copy of data owned by the remote owner; to generate a fingerprint using the key in a keyed cryptographic hash function as applied to the copy of data owned by the remote owner; and to send the fingerprint to another computing device in the peer-to-peer system for verifying the integrity of the copy of data owned by the remote owner. - View Dependent Claims (17, 18, 19, 20, 21)
-
22. A method, implemented at least in part by a computing device, comprising:
-
scheduling issuance of challenges to check integrity of data stored by one or more parties wherein an issued challenge requires a challenged party to apply a keyed cryptographic hash function and wherein the challenged party acts to remotely store the data for a data owner; and adjusting an issuance frequency for a party based at least in part on the party'"'"'s ability to meet one or more issued challenges. - View Dependent Claims (23, 24)
-
Specification