×

Identifying a compromised encoded data slice

  • US 9,063,968 B2
  • Filed: 07/16/2013
  • Issued: 06/23/2015
  • Est. Priority Date: 08/02/2010
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method for execution by one or more processing modules of a computing device, the method comprises:

  • in response to a read command, issuing at least a read threshold number of read requests regarding a set of encoded data slices, wherein a data segment is dispersed storage error encoded to produce the set of encoded data slices, wherein the data segment has a known integrity value, wherein a decode threshold number of encoded data slices of the set of encoded data slices is needed to recover the data segment, and wherein the read threshold number is greater than the decode threshold number;

    receiving the at least the read threshold number of encoded data slices;

    entering a loop that includes;

    selecting a unique combination of encoded data slices from the set of the at least the read threshold number of encoded data slices, wherein the unique combination includes the decode threshold number of encoded data slices;

    disperse storage error decoding the unique combination of encoded data slices to produce a recovered data segment;

    generating an integrity value for the recovered data segment;

    verifying the integrity value with the known integrity value;

    when the integrity value is verified, indicating that the unique combination of encoded data slices is valid;

    when the integrity value is not verified, indicating that the unique combination of encoded data slices is not valid;

    repeating the loop when less than a desired number of unique combinations of encoded data slices have been processed; and

    exiting the loop when the desired number of unique combinations of encoded data slices have been processed;

    utilizing one of the recovered data segments corresponding to one of the valid unique combinations of encoded data slice as a response to the read command; and

    identifying a compromised encoded data slice based on the unique combinations of encoded data slices that are not valid.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×