Network storage system for a download intensive environment
First Claim
Patent Images
1. A data storage server (DSS), comprising:
- an interface enabling connection of the DSS to a network at a location that enables at least a view of network transactions performed by a plurality of clients;
a content addressable storage (CAS); and
a system configured to monitor the network transactions occurring on the network and identify the network transactions as belonging to a registered client of the DSS, and store in the storage the transactions with an identification corresponding to the registered client, wherein the system is further configured to instruct a first client to send to a second client a digest value and a first challenge value;
instruct the second client to send to the first client an acknowledgement comprising the digest value, a first response and a second challenge;
instruct the first client to send the digest value and a second response;
instruct the second client to send the digest value, a retrieval key and a—
decryption key; and
instruct the first client to delete encrypted data corresponding to the digest value, wherein the first client has access to encrypted data of the second client enabled by the retrieval key and the decryption key.
3 Assignments
0 Petitions
Accused Products
Abstract
A network storage system for a download intensive environment is provided. The network storage comprises at least a data storage server (DSS) that includes an interface enabling connection of the DSS to a network at a location that enables at least a view of network transactions performed by a plurality of clients; a storage unit; and a system adapted to monitor the network transactions occurring on the network and identification of the network transactions as belonging to a registered client of the DSS, and storing in the storage the transactions with an identification corresponding to the registered client.
-
Citations
26 Claims
-
1. A data storage server (DSS), comprising:
-
an interface enabling connection of the DSS to a network at a location that enables at least a view of network transactions performed by a plurality of clients; a content addressable storage (CAS); and a system configured to monitor the network transactions occurring on the network and identify the network transactions as belonging to a registered client of the DSS, and store in the storage the transactions with an identification corresponding to the registered client, wherein the system is further configured to instruct a first client to send to a second client a digest value and a first challenge value;
instruct the second client to send to the first client an acknowledgement comprising the digest value, a first response and a second challenge;
instruct the first client to send the digest value and a second response;
instruct the second client to send the digest value, a retrieval key and a—
decryption key; and
instruct the first client to delete encrypted data corresponding to the digest value, wherein the first client has access to encrypted data of the second client enabled by the retrieval key and the decryption key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for logging data of registered clients in a download intensive network comprising:
-
capturing a data packet from the download intensive network; indexing data of the data packet with a client identification (CID) unique to the registered client, when the data packet belongs to at least one of the registered clients; storing the data in association with the client identification in a temporary storage; storing the data in permanent storage once all packets corresponding to the data have been received; instructing a first client to send to a second client a digest value and a first challenge value; instructing the second client to send to the first client an acknowledgement comprising the digest value, a first response and a second challenge; instructing the first client to send the digest value and a second response; causing the second client to send the digest value, a retrieval key and a decryption key; and instructing the first client to delete encrypted data corresponding to the digest value;
wherein the first client has access to encrypted data of the second client enabled by the retrieval key and the decryption key. - View Dependent Claims (17, 18, 19)
-
-
20. A method for controlling a data storage server (DSS) in a download intensive network comprising:
-
receiving a download data downloaded by a registered client; comparing data to the registered client stored operation on a respective virtual file system of the register client; instructing the DSS to permanently store the data on a backend storage (BES) pool by providing an appropriate stream address, when there is match; instructing a first client to send to a second client a digest value and a first challenge value; instructing the second client to send to the first client an acknowledgement comprising the digest value, a first response and a second challenge; instructing the first client to send the digest value and a second response; instructing the second client to send the digest value, a retrieval key and a decryption key; and instructing the first client to delete encrypted data corresponding to the digest value;
wherein the first client has access to encrypted data of the second client enabled by the retrieval key and the decryption key. - View Dependent Claims (21, 22, 23)
-
-
24. A method for sharing encrypted data in a data storage server (DSS) comprising:
-
sending a first challenge and a digest value from a first client to a second client for the purpose of confirming that an encrypted data may be jointly accessed by the first client and the second client; receiving from the second client the digest value, a first response responsive of the first challenge and a second challenge sent from the second client; sending from the first client to the second client the digest value and a second response responsive of the second challenge; and receiving from the second client the digest value, a retrieval key and a decryption key;
wherein the first client can access the encrypted data using the retrieval key and the decryption key without the need to store a duplicate copy of the encrypted data from the first client use. - View Dependent Claims (25, 26)
-
Specification