Proxy access to a dispersed storage network
First Claim
1. A method comprises:
- selecting one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory;
sending a DSN memory access request to the one of the plurality of DS processing modules wherein the one of the plurality of DS processing modules determines a DS unit storage set based on a security attack history of each DS unit, wherein the one of the plurality of DS processing modules has at least two different security approaches of connecting to each DS unit, and the at least two different security approaches are selected based on the security attack history of each DS unit;
when no response is received within a given time frame or when the response to the access request does not include an access indication, selecting another one of the plurality of DS processing modules; and
sending the DSN memory access request to the another one of the plurality of DS processing modules.
5 Assignments
0 Petitions
Accused Products
Abstract
A method begins with a processing module selecting one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory. The method continues with the processing module sending a DSN memory access request to the one of the plurality of DS processing modules. The method continues with the processing module selecting another one of the plurality of DS processing modules when no response is received within a given time frame or when the response to the access request does not include an access indication. The method continues with the processing module sending the DSN memory access request to the another one of the plurality of DS processing modules.
85 Citations
10 Claims
-
1. A method comprises:
-
selecting one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory; sending a DSN memory access request to the one of the plurality of DS processing modules wherein the one of the plurality of DS processing modules determines a DS unit storage set based on a security attack history of each DS unit, wherein the one of the plurality of DS processing modules has at least two different security approaches of connecting to each DS unit, and the at least two different security approaches are selected based on the security attack history of each DS unit; when no response is received within a given time frame or when the response to the access request does not include an access indication, selecting another one of the plurality of DS processing modules; and sending the DSN memory access request to the another one of the plurality of DS processing modules. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer comprises:
-
an interface; and a hardware processing module to; select one of a plurality of dispersed storage (DS) processing modules for facilitating access to a dispersed storage network (DSN) memory wherein the one of the plurality of DS processing modules has at least two different security approaches of connecting to each DS unit, and the at least two different security approaches are selected based on a security attack history of each DS unit; send, via the interface, a DSN memory access request to the one of the plurality of DS processing modules wherein the one of the plurality of DS processing modules determines a DS unit storage set based on the security attack history of each DS unit; select another one of the plurality of DS processing modules when no response is received within a given time frame or when the response to the access request does not include an access indication; and send, via the interface, the DSN memory access request to the another one of the plurality of DS processing modules. - View Dependent Claims (7, 8, 9, 10)
-
Specification