×

Utilizing a deterministic all or nothing transformation in a dispersed storage network

  • US 9,231,768 B2
  • Filed: 06/07/2011
  • Issued: 01/05/2016
  • Est. Priority Date: 06/22/2010
  • Status: Active Grant
First Claim
Patent Images

1. A method for execution by a computing device, the method comprises:

  • performing a function to generate a deterministic key from a data segment, in which the data segment is one of a plurality of data segments generated by segmenting a data object and in which the data segments are processed separately for storage to store the data object;

    encrypting the data segment using the deterministic key to produce encrypted data;

    performing a transform function on the encrypted data to produce transformed data;

    performing a masking function on the deterministic key and the transformed data to generate a masked key;

    combining the masked key and the encrypted data to produce a secure package; and

    error encoding the secure package to generate a plurality of data slices for storage, wherein a threshold number of data slices of the secure package are needed to reconstruct the secure package when retrieved, the threshold number of data slices being less than the plurality of data slices generated.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×