×

Identifying a potentially compromised encoded data slice

  • US 9,146,810 B2
  • Filed: 02/06/2015
  • Issued: 09/29/2015
  • Est. Priority Date: 01/31/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method for determining a compromised encoded slice in a dispersed storage network that is configured with a plurality of dispersed storage units, comprising:

  • retrieving a first threshold combination of encoded slices from a first set of dispersed storage devices of the dispersed storage network to reconstruct a segment, in which the segment is dispersed error encoded to produce n number of encoded slices and stored in the plurality of dispersed storage units, and in which at least a threshold number of the n number of encoded slices are needed to reconstruct the segment, where the threshold number is less than n;

    reconstructing the segment from the retrieved first threshold combination of encoded slices;

    verifying integrity of the reconstructed segment from the first threshold combination of encoded slices;

    when the reconstruction of the retrieved first threshold combination of encoded slices is negatively verified, replacing one of the encoded slices of the retrieved first threshold combination of encoded slices with one of the encoded slices of the segment stored in one of the dispersed storage units that is not an encoded slice forming the first threshold combination of encoded slices, in order to form a second threshold combination of encoded slices;

    reconstructing the segment from the retrieved second threshold combination of encoded slices;

    verifying integrity of the reconstructed segment from the second threshold combination of encoded slices; and

    when the reconstruction of the retrieved second threshold combination of encoded slices is negatively verified, returning to the first threshold combination of encoded slices and replacing a second of the encoded slices of the retrieved first threshold combination of encoded slices to reconstruct the segment for verification and continue replacing other encoded slices of the retrieved first threshold combination of encoded slices one at a time to form other threshold combination of encoded slices, until affirmative verification is achieved to recover the segment.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×