Method and apparatus for accessing secure data in a dispersed storage system
First Claim
1. A method comprises:
- receiving, by a first computing device, a first request from a user device to access secure data, wherein the first request includes a user identification code (ID) and at least one object name for the secure data;
processing, by the first computing device, the first request to determine a level of access to the secure data for the user device;
when the level of access is of an acceptable level, facilitating, by the first computing device, sending a set of encoded data slices to the user device, wherein the set of encoded data slices includes less than a reconstruction threshold number of encoded data slices to reconstruct at least a segment of the secure data;
receiving, by a second computing device, a second request from the user device to access the secure data, wherein the second request includes the user ID, the at least one object name for the secure data, and a representation of the first request;
processing, by the second computing device, the second request to determine the level of access to the secure data for the user device; and
when the level of access is of the acceptable level, facilitating, by the second computing device, sending a second set of encoded data slices to the user device, wherein the second set of encoded data slices includes less than the reconstruction threshold number of encoded data slices and wherein, when the level of access is at a given level, the set of encoded data slices and the second set of encoded data slices includes at least the reconstruction threshold number of encoded data slices.
3 Assignments
0 Petitions
Accused Products
Abstract
A method begins with a first computing device receiving a first request from a user device to access secure data. The method continues with the first computing device processing the first request to determine a level of access. When the level of access is acceptable, the method continues with the first computing device facilitating sending a set of encoded data slices to the user device. The method continues with a second computing device receiving a second request from the user device. The method continues with the second computing device processing the second request to determine the level of access. When the level of access is acceptable, the method continues with the second computing device facilitating sending a second set of encoded data slices to the user device. When the level of access is at a given level, the sets include a reconstruction threshold number of encoded data slices.
34 Citations
18 Claims
-
1. A method comprises:
-
receiving, by a first computing device, a first request from a user device to access secure data, wherein the first request includes a user identification code (ID) and at least one object name for the secure data; processing, by the first computing device, the first request to determine a level of access to the secure data for the user device; when the level of access is of an acceptable level, facilitating, by the first computing device, sending a set of encoded data slices to the user device, wherein the set of encoded data slices includes less than a reconstruction threshold number of encoded data slices to reconstruct at least a segment of the secure data; receiving, by a second computing device, a second request from the user device to access the secure data, wherein the second request includes the user ID, the at least one object name for the secure data, and a representation of the first request; processing, by the second computing device, the second request to determine the level of access to the secure data for the user device; and when the level of access is of the acceptable level, facilitating, by the second computing device, sending a second set of encoded data slices to the user device, wherein the second set of encoded data slices includes less than the reconstruction threshold number of encoded data slices and wherein, when the level of access is at a given level, the set of encoded data slices and the second set of encoded data slices includes at least the reconstruction threshold number of encoded data slices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable storage medium comprises:
-
a first memory portion that stores operational instructions that, when executed by a first computing device, causes the first computing device to; receive a first request from a user device to access secure data, wherein the first request includes a user identification code (ID) and at least one object name for the secure data; process the first request to determine a level of access to the secure data for the user device; when the level of access is of an acceptable level, facilitate sending a set of encoded data slices to the user device, wherein the set of encoded data slices includes less than a reconstruction threshold number of encoded data slices to reconstruct at least a segment of the secure data; a second memory portion that stores operational instructions that, when executed by a second computing device, causes the second computing device to; receive a second request from the user device to access the secure data, wherein the second request includes the user ID, the at least one object name for the secure data, and a representation of the first request; process the second request to determine the level of access to the secure data for the user device; and when the level of access is of the acceptable level, facilitate sending a second set of encoded data slices to the user device, wherein the second set of encoded data slices includes less than the reconstruction threshold number of encoded data slices and wherein, when the level of access is at a given level, the set of encoded data slices and the second set of encoded data slices includes at least the reconstruction threshold number of encoded data slices. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification