Data archiving system
First Claim
Patent Images
1. A computer-implemented method of storing data files, comprising:
- receiving data files for storage;
serializing the files by assigning an associative serial number to each file;
creating an associative cryptographic hash of each file;
generating a first list of the serialized associative cryptographic hashes of the received files;
closing the first list after a predetermined time interval;
determining an associative cryptographic hash of the closed first list;
storing the closed list in a first storage;
iteratively generating, closing, and storing subsequent lists of serialized associative cryptographic hashes of received files, wherein the first element of each subsequent list is the associative cryptographic hash of the last closed list;
re-computing the associative cryptographic hash of a closed list;
verifying the authenticity of a closed list by comparing the recorded associative cryptographic hash of the closed list in a subsequent list to the re-computed cryptographic hash of the closed list; and
reporting an error when the comparison indicates a mismatch.
8 Assignments
0 Petitions
Accused Products
Abstract
An encrypted file storage solution consists of a cluster of processing nodes, external data storage, and a software agent (the “File System Watcher”), which is installed on the application servers. Cluster sizes of one node up to many hundreds of nodes are possible. There are also remote “Key Servers” which provide various services to one or more clusters. The preceding describes a preferred embodiment, though in some cases it may be desirable to “collapse” some of the functionality into a smaller number of hardware devices, typically trading off cost versus security and fault-tolerance.
-
Citations
7 Claims
-
1. A computer-implemented method of storing data files, comprising:
-
receiving data files for storage; serializing the files by assigning an associative serial number to each file; creating an associative cryptographic hash of each file; generating a first list of the serialized associative cryptographic hashes of the received files; closing the first list after a predetermined time interval; determining an associative cryptographic hash of the closed first list; storing the closed list in a first storage; iteratively generating, closing, and storing subsequent lists of serialized associative cryptographic hashes of received files, wherein the first element of each subsequent list is the associative cryptographic hash of the last closed list; re-computing the associative cryptographic hash of a closed list; verifying the authenticity of a closed list by comparing the recorded associative cryptographic hash of the closed list in a subsequent list to the re-computed cryptographic hash of the closed list; and reporting an error when the comparison indicates a mismatch. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification