Secure data parser method and system
First Claim
Patent Images
1. A method for securing a data set in a distributed storage network, the method comprising:
- encrypting, using a hardware processor, the data set using an encryption key;
generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random shuffling of a respective subset of the encrypted data set;
generating encryption key information that is capable of being used to generate the encryption key, wherein the encryption key information is distributed among the at least two portions of data; and
storing each of the at least two portions of data to separate storage locations of the distributed storage network.
4 Assignments
0 Petitions
Accused Products
Abstract
A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths.
-
Citations
22 Claims
-
1. A method for securing a data set in a distributed storage network, the method comprising:
-
encrypting, using a hardware processor, the data set using an encryption key; generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random shuffling of a respective subset of the encrypted data set; generating encryption key information that is capable of being used to generate the encryption key, wherein the encryption key information is distributed among the at least two portions of data; and storing each of the at least two portions of data to separate storage locations of the distributed storage network. - View Dependent Claims (2, 3, 4)
-
-
5. A method for securing a data set in a distributed storage network, the method comprising:
-
generating, using a hardware processor, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random shuffling of a respective subset of the data set; encrypting the at least two portions of data using an encryption key; generating encryption key information that is capable of being used to generate the encryption key, wherein the encryption key information is distributed among the at least two portions of data; and storing the at least two encrypted portions of data to separate storage locations of the distributed storage network. - View Dependent Claims (6, 7, 8)
-
-
9. A method for securing a data set in a distributed storage network, the method comprising:
-
encrypting the data set, using a hardware processor, using an encryption key; transforming the encryption key using an All or Nothing Transform into a transformed encryption key; generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random shuffling of a respective subset of the encrypted data set; generating transformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distribute among the at least two portions of data; and storing each of the at least two portions of data to separate storage locations of the distributed storage network. - View Dependent Claims (10, 11)
-
-
12. A method for securing a data set in a distributed storage network, the method comprising:
-
generating, using a hardware processor, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random shuffling of a respective subset of the data set; encrypting each of the at least two portions of data using an encryption key into at least two portions of encrypted data; transforming the encryption key using an All or Nothing Transform into a transformed encryption key; generating transformed encryption key information that is capable of being used to generate the transformed encryption key, wherein the transformed encryption key information is distributed among the at least two portions of data; and storing each of the at least two portions of encrypted data to separate storage locations of the distributed storage network. - View Dependent Claims (13, 14)
-
-
15. A method for securing a data set, the method comprising:
-
generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random shuffling of a respective subset of the data set; transforming the splitting key using an All or Nothing Transform into a transformed splitting key; generating transformed splitting key information that is capable of being used to generate the transformed splitting key, wherein the transformed splitting key information is distributed among the at least two portions of data; storing each of the at least two portions of data separately; and restoring the data set from at least a subset of the at least two portions of data. - View Dependent Claims (16)
-
-
17. A method for securing a data set in a distributed storage network, the method comprising:
-
encrypting, using a hardware processor, the data set using an encryption key into an encrypted data set; encrypting the encryption key; generating at least two portions of data from the encrypted data set, wherein each of the at least two portions of data respectively contains a substantially random shuffling of a respective subset of the encrypted data set; storing each of the at least two portions of the encrypted data set to separate storage locations of the distributed storage network; restoring the encrypted data set from at least a subset of the at least two portions of the encrypted data set; and decrypting the encryption key. - View Dependent Claims (18)
-
-
19. A method for securing a data set in a distributed storage network, the method comprising:
-
generating, using a hardware processor, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random shuffling of a respective subset of the data set; encrypting the at least two portions of data using an encryption key into at least two encrypted portions of data; encrypting the encryption key; and storing each of the at least two encrypted portions of data to separate storage locations of the distributed storage network. - View Dependent Claims (20)
-
-
21. A method for securing a data set, the method comprising:
-
generating, using a splitting key, at least two portions of data from the data set, wherein each of the at least two portions of data respectively contains a substantially random shuffling of a respective subset of the data set; encrypting the splitting key using an encryption key; storing each of the at least two portions of the data set separately; and restoring the data set from at least a subset of the at least two portions of the data set, the restoring comprising; decrypting the splitting key, and restoring, using the splitting key, the data set from the at least a subset of the at least two portions of data. - View Dependent Claims (22)
-
Specification