STORING ACCESS INFORMATION IN A DISPERSED STORAGE NETWORK
First Claim
1. A method comprises:
- applying a share encoding function on data to produce a plurality of encoded shares;
generating a plurality of random numbers;
obtaining a set of personalized authenticating values regarding user access to the data;
generating a plurality of hidden passwords based on the set of personalized authenticating values;
for each encoded share of the plurality of encoded shares;
generating an encryption key based on a corresponding one of the plurality of hidden passwords and a corresponding one of the plurality of random numbers; and
encrypting the encoded share utilizing the encryption key to produce an encrypted share; and
facilitating storage of the plurality of random numbers and each of the encrypted shares.
5 Assignments
0 Petitions
Accused Products
Abstract
A method begins by a processing module applying a share encoding function on data to produce a plurality of encoded shares and generating a plurality of random numbers. The method continues with the processing module obtaining a set of personalized authenticating values regarding user access to the data and generating a plurality of hidden passwords based on the set of personalized authenticating values. The method continues with the processing module generating an encryption key based on a corresponding one of the plurality of hidden passwords and a corresponding one of the plurality of random numbers and encrypting the encoded share utilizing the encryption key to produce an encrypted share for each encoded share of the plurality of encoded shares. The method continues with the processing module facilitating storage of the plurality of random numbers and each of the encrypted shares.
-
Citations
18 Claims
-
1. A method comprises:
-
applying a share encoding function on data to produce a plurality of encoded shares; generating a plurality of random numbers; obtaining a set of personalized authenticating values regarding user access to the data; generating a plurality of hidden passwords based on the set of personalized authenticating values; for each encoded share of the plurality of encoded shares; generating an encryption key based on a corresponding one of the plurality of hidden passwords and a corresponding one of the plurality of random numbers; and encrypting the encoded share utilizing the encryption key to produce an encrypted share; and facilitating storage of the plurality of random numbers and each of the encrypted shares. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer comprises:
-
an interface; a memory; and a processing module operable to; apply a share encoding function on data to produce a plurality of encoded shares; generate a plurality of random numbers; obtain a set of personalized authenticating values regarding user access to the data; generate a plurality of hidden passwords based on the set of personalized authenticating values; for each encoded share of the plurality of encoded shares; generate an encryption key based on a corresponding one of the plurality of hidden passwords and a corresponding one of the plurality of random numbers; and encrypt the encoded share utilizing the encryption key to produce an encrypted share; and facilitate storage of the plurality of random numbers and each of the encrypted shares. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification