Authenticating a data access request to a dispersed storage network
First Claim
Patent Images
1. A computer implemented method comprises:
- sending, by a user device, a plurality of data access requests to storage units, wherein the plurality of data access requests is regarding a set of encoded data slices that are distributedly stored among the storage units, wherein a data segment of data is dispersed error encoded in accordance with dispersed storage error encoding parameters to produce the set of encoded data slices, wherein a write threshold number of encoded data slices of the set of encoded data slices provides successful storage of the data segment within the storage units, and wherein a decode threshold number of encoded data slices of the set of encoded data slices are required to recover the data segment;
sending, by one the storage units, an authentication request to an authenticating module;
forwarding, by the one of the storage units, a verification request to the user device;
forwarding, by the one of the storage units, a verification response to the authenticating module; and
executing, by at least some of the storage units, corresponding ones of the plurality of data access requests when an authentication response of the authenticating module is favorable, wherein the plurality of data access requests corresponds to at least one of the decode threshold number of encoded data slices or the write threshold number of encoded data slices.
4 Assignments
0 Petitions
Accused Products
Abstract
A method includes sending, by a user device, a plurality of data access requests to storage units. The method further includes sending, by one the storage units, an authentication request to an authenticating module. The method further includes forwarding, by the one of the storage units, a verification request to the user device. The method further includes forwarding, by the one of the storage units, a verification response to the authenticating module. The method further includes executing, by at least some of the storage units, corresponding ones of the plurality of data access requests when an authentication response of the authenticating module is favorable.
-
Citations
12 Claims
-
1. A computer implemented method comprises:
-
sending, by a user device, a plurality of data access requests to storage units, wherein the plurality of data access requests is regarding a set of encoded data slices that are distributedly stored among the storage units, wherein a data segment of data is dispersed error encoded in accordance with dispersed storage error encoding parameters to produce the set of encoded data slices, wherein a write threshold number of encoded data slices of the set of encoded data slices provides successful storage of the data segment within the storage units, and wherein a decode threshold number of encoded data slices of the set of encoded data slices are required to recover the data segment; sending, by one the storage units, an authentication request to an authenticating module; forwarding, by the one of the storage units, a verification request to the user device; forwarding, by the one of the storage units, a verification response to the authenticating module; and executing, by at least some of the storage units, corresponding ones of the plurality of data access requests when an authentication response of the authenticating module is favorable, wherein the plurality of data access requests corresponds to at least one of the decode threshold number of encoded data slices or the write threshold number of encoded data slices. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable storage device comprises:
-
a first memory section storing operational instructions that, when executed by a user computing device, causes the user computing device to; send a plurality of data access requests to storage units, wherein the plurality of data access requests is regarding a set of encoded data slices that are distributedly stored among the storage units, wherein a data segment of data is dispersed error encoded in accordance with dispersed storage error encoding parameters to produce the set of encoded data slices, wherein a write threshold number of encoded data slices of the set of encoded data slices provides successful storage of the data segment within the storage units, and wherein a decode threshold number of encoded data slices of the set of encoded data slices are required to recover the data segment; a second memory section storing operational instructions that, when executed by one of the storage units, causes the one of the storage units to; send an authentication request to an authenticating device; forward a verification request to the user computing device; forward a verification response to the authenticating device; and a third memory section storing operational instructions that, when executed by one of the storage units, causes the one of the storage units to; execute, along with at least some of the storage units, a corresponding one of the plurality of data access requests when an authentication response of the authenticating device is favorable, wherein the plurality of data access requests corresponds to at least one of the decode threshold number of encoded data slices or the write threshold number of encoded data slices. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification