Authenticating a data access request to a dispersed storage network
First Claim
1. A computer implemented method comprises:
- sending, by a data accessing module of a dispersed storage network (DSN), a data access request to a data storage module of the DSN;
sending, by the data storage module, an authentication request to an authenticating module of the DSN, wherein the authentication request includes at least a portion of the data access request;
outputting, by the authenticating module, a verification request destined for the data accessing module, wherein the verification request includes a verification code that is generated based on the authentication request;
outputting, by the data accessing module, a verification response destined for the authenticating module, wherein the verification response includes a modified verification code that is generated based on the verification code and a credential;
outputting, by the authenticating module, an authentication response to the data storage module, wherein the authentication response is generated based on the verification response; and
facilitating, by the data storage module, the data access request when the authentication response is favorable.
5 Assignments
0 Petitions
Accused Products
Abstract
A method to authenticate a data access request begins by a data accessing module sending the data access request to a data storage module and continues with the data storage module sending an authentication request to an authenticating module. The method continues with the authenticating module outputting a verification request destined for the data accessing module, where the verification request includes a verification code that is generated based on the authentication request. The method continues with the data accessing module outputting a verification response that includes a modified verification code that is generated based on the verification code and a credential. The method continues with the authenticating module outputting an authentication response to the data storage module, where the authentication response is generated based on the verification response, and continues with the data storage module facilitating the data access request when the authentication response is favorable.
326 Citations
22 Claims
-
1. A computer implemented method comprises:
-
sending, by a data accessing module of a dispersed storage network (DSN), a data access request to a data storage module of the DSN; sending, by the data storage module, an authentication request to an authenticating module of the DSN, wherein the authentication request includes at least a portion of the data access request; outputting, by the authenticating module, a verification request destined for the data accessing module, wherein the verification request includes a verification code that is generated based on the authentication request; outputting, by the data accessing module, a verification response destined for the authenticating module, wherein the verification response includes a modified verification code that is generated based on the verification code and a credential; outputting, by the authenticating module, an authentication response to the data storage module, wherein the authentication response is generated based on the verification response; and facilitating, by the data storage module, the data access request when the authentication response is favorable. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method comprises:
-
receiving a data access request from a data accessing module of a dispersed storage network (DSN); sending an authentication request to an authenticating module of the DSN, wherein the authentication request includes at least a portion of the data access request; receiving an authentication response from the authenticating module, wherein the authentication response is generated based on a verification response of the data accessing module; and facilitating the data access request when the authentication response is favorable. - View Dependent Claims (9)
-
-
10. A computer implemented method comprises:
-
receiving an authentication request from a data storage module of a dispersed storage network (DSN), wherein the authentication request includes at least a portion of a data access request of a data accessing module of the DSN; outputting a verification request destined for the data accessing module, wherein the verification request includes a verification code that is generated based on the authentication request; receiving a verification response, wherein the verification response includes a modified verification code that is generated by the data accessing module based on the verification code and a credential; and outputting an authentication response that is generated based on the verification response, wherein, the data access request is authenticated when the authentication response is favorable. - View Dependent Claims (11)
-
-
12. A dispersed storage network (DSN) comprises:
-
a data accessing unit that includes; an data access unit interface; and a data access processing module; a data storage unit that includes; a data storage interface; and a data storage processing module; and an authenticating unit that includes; an authenticating interface; and an authenticating processing module, wherein; the data accessing unit sends, via the data accessing interface, a data access request to the data storage unit; the data storage unit sends, via the data storage interface, an authentication request to the authenticating unit, wherein the authentication request includes at least a portion of the data access request; the authenticating unit outputs, via the authenticating interface, a verification request destined for the data accessing unit, wherein the verification request includes a verification code that is generated based on the authentication request; the data accessing unit outputs, via the data accessing interface, a verification response destined for the authenticating unit, wherein the verification response includes a modified verification code that is generated based on the verification code and a credential; the authenticating unit outputs, via the authenticating interface, an authentication response to the data storage unit, wherein the authentication response is generated based on the verification response; and the data storage unit facilitates the data access request when the authentication response is favorable. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A computer comprises:
-
an interface; a memory; and a processing module operable to; receive, via the interface, a data access request from a data accessing module of a dispersed storage network (DSN); send, via the interface, an authentication request to an authenticating module of the DSN, wherein the authentication request includes at least a portion of the data access request; receive, via the interface, an authentication response from the authenticating module, wherein the authentication response is generated based on a verification response of the data accessing module; and facilitate the data access request when the authentication response is favorable. - View Dependent Claims (20)
-
-
21. A computer comprises:
-
an interface; a memory; and a processing module operable to; receive, via the interface, an authentication request from a data storage module of a dispersed storage network (DSN), wherein the authentication request includes at least a portion of a data access request of a data accessing module of the DSN; output, via the interface, a verification request destined for the data accessing module, wherein the verification request includes a verification code that is generated based on the authentication request; receive, via the interface, a verification response, wherein the verification response includes a modified verification code that is generated by the data accessing module based on the verification code and a credential; and output, via the interface, an authentication response that is generated based on the verification response, wherein, the data access request is authenticated when the authentication response is favorable. - View Dependent Claims (22)
-
Specification