DISPERSED STORAGE SECURE DATA DECODING
First Claim
Patent Images
1. A method operating on a computer, the method comprises:
- generating a read command to read at least some of a plurality of data slices from a dispersed storage network;
receiving the at least some of the plurality of data slices;
performing a reverse information dispersal algorithm on at least some of the plurality of data slices to produce a plurality of transposed data elements; and
reverse transposing the plurality of transposed data elements to recover data elements of a data segment.
5 Assignments
0 Petitions
Accused Products
Abstract
A method operating on a computer begins by generating a read command to read at least some of a plurality of data slices from a dispersed storage network. The method continues by receiving the at least some of the plurality of data slices. The method continues by performing a reverse information dispersal algorithm on at least some of the plurality of data slices to produce a plurality of transposed data elements. The method continues by reverse transposing the plurality of transposed data elements to recover data elements of a data segment.
-
Citations
12 Claims
-
1. A method operating on a computer, the method comprises:
-
generating a read command to read at least some of a plurality of data slices from a dispersed storage network; receiving the at least some of the plurality of data slices; performing a reverse information dispersal algorithm on at least some of the plurality of data slices to produce a plurality of transposed data elements; and reverse transposing the plurality of transposed data elements to recover data elements of a data segment. - View Dependent Claims (2, 3, 4)
-
-
5. A method operating on a computer and comprising the steps of:
-
generating a read command to read at least some of a plurality of data slices from a dispersed storage network; de-slicing the at least some of the plurality of data slices using a reverse information dispersal algorithm to produce an all-or-nothing encrypted data segment; and applying a reverse all-or-nothing transformation on the all-or-nothing encrypted data segment to recover a data segment. - View Dependent Claims (6, 7)
-
-
8. A computer comprising:
-
a network port adapted to couple with a network and receive at least some of a plurality of data slices; and a processor coupled to said network port wherein said processor; receives the at least some of the plurality of data slices from the network port; performs a reverse information dispersal algorithm on at least some of the plurality of data slices to produce a plurality of transposed data elements; and reverse transposes the plurality of transposed data elements to recover data elements of a data segment. - View Dependent Claims (9, 10)
-
-
11. A computer comprising:
-
a network port adapted to couple with a network and receive at least some of a plurality of data slices; and a processor coupled to said network port wherein said processor; receives the at least some of a plurality of data slices from the network port; de-slices the at least some of the plurality of data slices using a reverse information dispersal algorithm to produce an all-or-nothing encrypted data segment; and applies a reverse all-or-nothing transformation on the all-or-nothing encrypted data segment to recover a data segment. - View Dependent Claims (12)
-
Specification