Reproducing data from obfuscated data retrieved from a dispersed storage network
First Claim
1. A method comprises:
- processing a data retrieval request that identifies data, wherein the data is stored in dispersed storage memory as a plurality of sets of encoded data slices, wherein one or more encoded data slices of the plurality of sets of encoded data slices has been replaced with one or more encoded secret data slices, and wherein the one or more encoded secret data slices represents secret data;
receiving, in response to the processing the data retrieval request, at least a threshold number of the plurality of sets of encoded data slices;
determining whether a secret data extraction process is initiated, wherein the determining whether the secret data extraction process is initiated includes at least one of;
the data retrieval request further including a request to initiate the secret data extraction process;
receiving a secret data extraction request to initiate the secret data extraction process; and
interpreting the plurality of sets of encoded data slices to identify a pattern of invalid encoded data slices;
interpreting the pattern of invalid encoded data slices as a secret data pattern; and
initiating the secret data extraction process when the secret data pattern is valid; and
when the secret data extraction process is initiated;
obtaining an inter-dispersing function to extract the one or more encoded secret slices from the plurality of sets of encoded data slices to produce extracted encoded secret slices; and
decoding the extracted encoded secret slices in accordance with secret dispersed storage error encoding parameters to reproduce the secret data.
4 Assignments
0 Petitions
Accused Products
Abstract
A method begins by a processing module processing a data retrieval request that identifies data, wherein the data is stored as a plurality of sets of encoded data slices, wherein one or more encoded data slices of the plurality of sets of encoded data slices has been replaced with one or more encoded secret slices of secret data. The method continues with the processing module receiving at least a threshold number of the plurality of sets of encoded data slices and determining whether a secret data extraction process is initiated. The method continues with the processing module obtaining an inter-dispersing function to extract the one or more encoded secret slices to produce extracted encoded secret slices and decoding the extracted encoded secret slices in accordance with secret dispersed storage error encoding parameters to reproduce the secret data when the secret data extraction process is initiated.
-
Citations
18 Claims
-
1. A method comprises:
-
processing a data retrieval request that identifies data, wherein the data is stored in dispersed storage memory as a plurality of sets of encoded data slices, wherein one or more encoded data slices of the plurality of sets of encoded data slices has been replaced with one or more encoded secret data slices, and wherein the one or more encoded secret data slices represents secret data; receiving, in response to the processing the data retrieval request, at least a threshold number of the plurality of sets of encoded data slices; determining whether a secret data extraction process is initiated, wherein the determining whether the secret data extraction process is initiated includes at least one of; the data retrieval request further including a request to initiate the secret data extraction process; receiving a secret data extraction request to initiate the secret data extraction process; and interpreting the plurality of sets of encoded data slices to identify a pattern of invalid encoded data slices; interpreting the pattern of invalid encoded data slices as a secret data pattern; and initiating the secret data extraction process when the secret data pattern is valid; and when the secret data extraction process is initiated; obtaining an inter-dispersing function to extract the one or more encoded secret slices from the plurality of sets of encoded data slices to produce extracted encoded secret slices; and decoding the extracted encoded secret slices in accordance with secret dispersed storage error encoding parameters to reproduce the secret data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprises:
-
processing a data retrieval request that identifies data, wherein the data is stored in dispersed storage memory as a plurality of sets of encoded data slices, wherein one or more encoded data slices of the plurality of sets of encoded data slices has been replaced with one or more encoded secret data slices, and wherein the one or more encoded secret data slices represents secret data; determining whether a secret data extraction process is initiated, wherein the determining whether the secret data extraction process is initiated includes at least one of; the data retrieval request further including a request to initiate the secret data extraction process; receiving a secret data extraction request to initiate the secret data extraction process; and interpreting the plurality of sets of encoded data slices to identify a pattern of invalid encoded data slices; interpreting the pattern of invalid encoded data slices as a secret data pattern; and initiating the secret data extraction process when the secret data pattern is valid; and when the secret data extraction process is initiated; obtaining an inter-dispersing function to identify the one or more encoded secret slices from the plurality of sets of encoded data slices to produce identified encoded secret slices; retrieving at least a threshold number of the identified encoded secret slices; and decoding the at least a threshold number of the identified encoded secret slices in accordance with secret dispersed storage error encoding parameters to reproduce the secret data. - View Dependent Claims (8, 9)
-
-
10. A dispersed storage (DS) module comprises:
-
a first module storing operational instructions that, when operable within a computing device, causes the computing device to process a data retrieval request that identifies data, wherein the data is stored in dispersed storage memory as a plurality of sets of encoded data slices, wherein one or more encoded data slices of the plurality of sets of encoded data slices has been replaced with one or more encoded secret data slices, and wherein the one or more encoded secret data slices represents secret data; a second module storing operational instructions that, when operable within the computing device, causes the computing device to facilitate receiving, in response to the processing the data retrieval request, at least a threshold number of the plurality of sets of encoded data slices; a third module storing operational instructions that, when operable within the computing device, causes the computing device to determine whether a secret data extraction process is initiated, wherein the third module functions to determine whether the secret data extraction process is initiated by at least one of; the data retrieval request further including a request to initiate the secret data extraction process; receiving a secret data extraction request to initiate the secret data extraction process; and interpreting the plurality of sets of encoded data slices to identify a pattern of invalid encoded data slices; interpreting the pattern of invalid encoded data slices as a secret data pattern; and initiating the secret data extraction process when the secret data pattern is valid; and when the secret data extraction process is initiated; a fourth module storing operational instructions that, when operable within the computing device, causes the computing device to obtain an inter-dispersing function to extract the one or more encoded secret slices from the plurality of sets of encoded data slices to produce extracted encoded secret slices; and a fifth module storing operational instructions that, when operable within the computing device, causes the computing device to decode the extracted encoded secret slices in accordance with secret dispersed storage error encoding parameters to reproduce the secret data. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A dispersed storage (DS) module comprises:
-
a first module storing operational instructions that, when operable within a computing device, causes the computing device to process a data retrieval request that identifies data, wherein the data is stored in dispersed storage memory as a plurality of sets of encoded data slices, wherein one or more encoded data slices of the plurality of sets of encoded data slices has been replaced with one or more encoded secret data slices, and wherein the one or more encoded secret data slices represents secret data; a second module storing operational instructions that, when operable within the computing device, causes the computing device to determine whether a secret data extraction process is initiated, wherein the second module functions to determine whether the secret data extraction process is initiated by at least one of; the data retrieval request further including a request to initiate the secret data extraction process; receiving a secret data extraction request to initiate the secret data extraction process; and interpreting the plurality of sets of encoded data slices to identify a pattern of invalid encoded data slices; interpreting the pattern of invalid encoded data slices as a secret data pattern; and initiating the secret data extraction process when the secret data pattern is valid; and when the secret data extraction process is initiated; a third module for obtaining an inter-dispersing function to identify the one or more encoded secret slices from the plurality of sets of encoded data slices to produce identified encoded secret slices; a fourth module storing operational instructions that, when operable within the computing device, causes the computing device to retrieve at least a threshold number of the identified encoded secret slices; and a fifth module storing operational instructions that, when operable within the computing device, causes the computing device to decode the at least a threshold number of the identified encoded secret slices in accordance with secret dispersed storage error encoding parameters to reproduce the secret data. - View Dependent Claims (17, 18)
-
Specification