Method and system for data security
First Claim
1. An apparatus for data security, the apparatus comprising:
- a random number generator generating random numbers;
a share calculator in communication with the random number generator, the share calculator selecting a random polynomial to generate one or more encoded data shares based at least in part on the random numbers;
the share calculator encoding based at least in part on a Rabin polynomial model that encodes client data in at least one constant coefficient of the random polynomial;
the share calculator discarding the random polynomial after generating the one or more encoded data shares; and
the share calculator constructing a second random polynomial based on the one or more encoded data shares, the second random polynomial being used to reconstruct client data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system and apparatus that advantageously provide a security protocol for data security. The apparatus includes a random number generator for generating random numbers and a share calculator in communication with the random number generator, the share calculator processes the data to generate one or more encoded data shares where the processing is based at least in part on the random numbers. The apparatus may further include a router that routes the encoded data shares, a switching fabric and associated logic. The data security system includes one or more storage devices that store client data and a splitter that controls access to the client data stored on the one or more storage devices where the splitter apparatus encodes at least a portion of the client data that is stored on the one or more storage devices.
5 Citations
14 Claims
-
1. An apparatus for data security, the apparatus comprising:
-
a random number generator generating random numbers; a share calculator in communication with the random number generator, the share calculator selecting a random polynomial to generate one or more encoded data shares based at least in part on the random numbers; the share calculator encoding based at least in part on a Rabin polynomial model that encodes client data in at least one constant coefficient of the random polynomial; the share calculator discarding the random polynomial after generating the one or more encoded data shares; and the share calculator constructing a second random polynomial based on the one or more encoded data shares, the second random polynomial being used to reconstruct client data. - View Dependent Claims (2)
-
-
3. A data security system, the system comprising:
-
one or more storage devices, the one or more storage devices storing client data; a share calculator, the share calculator providing access to the client data stored on the one or more storage devices, the share calculator selecting a random polynomial to encode at least a portion of the client data that is stored on the one or more storage devices; the share calculator encoding based at least in part on a Rabin polynomial model that encodes the at least the portion of the client data in at least one constant coefficient of the random polynomial; the share calculator discarding the random polynomial after encoding at least a portion of the client data that is stored on the one or more storage devices; and the share calculator constructing a second random polynomial based on the encoded client data, the second random polynomial being used to reconstruct the client data. - View Dependent Claims (4, 5)
-
-
6. A method for securing data in storage devices on a network, the method comprising:
-
generating at least one random number; selecting a random polynomial based in part on the at least one random number; encoding at least a portion of the data to generate encoded data shares, the encoding being based at least in part on the random polynomial and a Rabin polynomial model that encodes the at least the portion of the data in at least one constant coefficient of the random polynomial; discarding the random polynomial after generating the encoded data shares; storing the encoded data shares in a plurality of data storage devices, the plurality of data storage devices being non-transitory storage devices; and constructing a second random polynomial based on the encoded data shares, the second random polynomial being used to reconstruct the at least the portion of the data. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
Specification