METHOD AND APPARATUS FOR ACCESSING SECURE DATA IN A DISPERSED STORAGE SYSTEM
First Claim
1. A method for a computing device to securely access dispersedly stored data, the method comprises:
- generating a request to access secure data, wherein the request includes a user identification code (ID) and at least one object name for the secure data;
transmitting the request to a first dispersed storage network (DSN) access portal;
receiving, from the first DSN access portal, a first response that includes, for a data segment of the secure data, a first set of encoded data slices, wherein the first set of encoded data slices includes less than a reconstruction threshold number of encoded data slices, and wherein the first response is based on security level associated with the user ID and security parameters of the secure data;
generating a second request to access the secure data in response to receiving the first response, wherein the second request includes the user ID and the at least one object name for the secure data;
transmitting the second request to a second DSN access portal;
receiving, from the second DSN access portal, a second response that includes, for the data segment of the secure data, a second set of encoded data slices, wherein the second set of the encoded data slices includes less than the reconstruction threshold number of encoded data slices, wherein the second response is based on the security level associated with the user ID, the first response, and the security parameters of the secure data; and
when the first and second sets of encoded data slices include at least the reconstruction threshold number of encoded data slices, decoding the first and second sets of encoded data slices to reconstruct the data segment.
5 Assignments
0 Petitions
Accused Products
Abstract
A method begins by a processing module receiving, from a user device, a request to access secure data, wherein the request includes a user identification code and at least one object name for the secure data. The method continues with the processing module processing the request to determine a security level associated with the user device and to determine security parameters associated with the secure data. The method continues with the processing module determining a level of access to the secure data based on the security level associated with the user device and the security parameters. The method continues with the processing module retrieving a set of encoded data slices from dispersed storage units, wherein the set of encoded data slices includes less than a reconstruction threshold number of encoded data slices and generating a response that includes the set of encoded data slices when the level of access is a partial access level.
128 Citations
20 Claims
-
1. A method for a computing device to securely access dispersedly stored data, the method comprises:
-
generating a request to access secure data, wherein the request includes a user identification code (ID) and at least one object name for the secure data; transmitting the request to a first dispersed storage network (DSN) access portal; receiving, from the first DSN access portal, a first response that includes, for a data segment of the secure data, a first set of encoded data slices, wherein the first set of encoded data slices includes less than a reconstruction threshold number of encoded data slices, and wherein the first response is based on security level associated with the user ID and security parameters of the secure data; generating a second request to access the secure data in response to receiving the first response, wherein the second request includes the user ID and the at least one object name for the secure data; transmitting the second request to a second DSN access portal; receiving, from the second DSN access portal, a second response that includes, for the data segment of the secure data, a second set of encoded data slices, wherein the second set of the encoded data slices includes less than the reconstruction threshold number of encoded data slices, wherein the second response is based on the security level associated with the user ID, the first response, and the security parameters of the secure data; and
when the first and second sets of encoded data slices include at least the reconstruction threshold number of encoded data slices, decoding the first and second sets of encoded data slices to reconstruct the data segment. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for a computing device to facilitate secure access to dispersedly stored data, the method comprises:
-
receiving, from a user device, a request to access secure data, wherein the request includes a user identification code (ID) and at least one object name for the secure data; processing the request to; determine security level associated with the user device; and determine security parameters associated with the secure data; determining a level of access to the secure data based on the security level associated with the user device and the security parameters; when the level of access is a partial access level; retrieve a set of encoded data slices from dispersed storage units, wherein the set of encoded data slices includes less than a reconstruction threshold number of encoded data slices; and generate a response that includes the set of encoded data slices. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computing device comprises:
-
an interface; and a processing module operable to; generate a request to access secure data, wherein the request includes a user identification code (ID) and at least one object name for the secure data; transmit, via the interface, the request to a first dispersed storage network (DSN) access portal; receive, from the first DSN access portal via the interface, a first response that includes, for a data segment of the secure data, a first set of encoded data slices, wherein the first set of encoded data slices includes less than a reconstruction threshold number of encoded data slices, and wherein the first response is based on security level associated with the user ID and security parameters of the secure data; generate a second request to access the secure data in response to receiving the first response, wherein the second request includes the user ID and the at least one object name for the secure data; transmit, via the interface, the second request to a second DSN access portal; receive, from the second DSN access portal via the interface, a second response that includes, for the data segment of the secure data, a second set of encoded data slices, wherein the second set of the encoded data slices includes less than the reconstruction threshold number of encoded data slices, wherein the second response is based on the security level associated with the user ID, the first response, and the security parameters of the secure data; and when the first and second sets of encoded data slices include at least the reconstruction threshold number of encoded data slices, decode the first and second sets of encoded data slices to reconstruct the data segment. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A computing device comprises:
-
an interface; and a processing module operable to; receive, from a user device via the interface, a request to access secure data, wherein the request includes a user identification code (ID) and at least one object name for the secure data; process the request to; determine security level associated with the user device; and determine security parameters associated with the secure data; determine a level of access to the secure data based on the security level associated with the user device and the security parameters; when the level of access is a partial access level; retrieve, via the interface, a set of encoded data slices from dispersed storage units, wherein the set of encoded data slices includes less than a reconstruction threshold number of encoded data slices; and generate a response that includes the set of encoded data slices. - View Dependent Claims (17, 18, 19, 20)
-
Specification