×

Method and apparatus for accessing secure data in a dispersed storage system

  • US 8,689,354 B2
  • Filed: 06/09/2010
  • Issued: 04/01/2014
  • Est. Priority Date: 09/29/2009
  • Status: Active Grant
First Claim
Patent Images

1. A method for a computing device to securely access dispersedly stored data, the method comprises:

  • generating, by a processor of the computing device, a request to access secure data, wherein the request includes a user identification code (ID) and at least one object name for the secure data and wherein the secure data includes one or more of;

    financial account information, user password information, security credential information, and personal data;

    transmitting the request to a first dispersed storage network (DSN) access portal;

    receiving, from the first DSN access portal, a first response that includes, for a data segment of the secure data, a first set of encoded data slices, wherein the first set of encoded data slices includes less than a reconstruction threshold number of encoded data slices, wherein the first response is based on security level associated with the user ID and security parameters of the secure data, and wherein the security parameters includes at least one of a secrecy level of data, an amount of data, encryption information regarding the data, codec information regarding the data, and error coding dispersal storage function parameters;

    generating a second request to access the secure data in response to receiving the first response, wherein the second request includes the user ID and the at least one object name for the secure data;

    transmitting the second request to a second DSN access portal;

    receiving, from the second DSN access portal, a second response that includes, for the data segment of the secure data, a second set of encoded data slices, wherein the second set of encoded data slices includes less than the reconstruction threshold number of encoded data slices, wherein the second response is based on the security level associated with the user ID, the first response, and the security parameters of the secure data; and

    when the first and second sets of encoded data slices include at least the reconstruction threshold number of encoded data slices, decoding the first and second sets of encoded data slices to reconstruct the data segment.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×