Data storage integrity validation
First Claim
1. A computer-implemented method, comprising:
- receiving a request to store a data object comprising a first plurality of partitions, each partition of the first plurality of partitions having a first partition size selected by a requestor associated with the request;
verifying the data object using a data verification algorithm to generate a first verification value based at least in part on the first partition size, wherein the first verification value is derived from a second verification value generated based at least in part on at least two of the first plurality of partitions;
storing the data object and the first verification value;
partitioning the data object into a second plurality of partitions, each partition of the second plurality of partitions having a second partition size different than the first partition size; and
verifying the data object using the data verification algorithm by at least;
generating a third verification value based at least on the second partition size; and
comparing the third verification value with the first verification value.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present disclosure are directed to, among other things, validating the integrity of received and/or stored data payloads. In some examples, a storage service may perform a first partitioning of a data object into first partitions based at least in part on a first operation. The storage service may also verify the data object, by utilizing a verification algorithm, to generate a first verification value. In some cases, the storage service may additionally perform a second partitioning of the data object into second partitions based at least in part on a second operation. The second partitions may be different from the first partitions. Additionally, the archival data storage service may verify the data object using the verification algorithm to generate a second verification value. Further, the storage service may determine whether the second verification value equals the first verification value.
179 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
receiving a request to store a data object comprising a first plurality of partitions, each partition of the first plurality of partitions having a first partition size selected by a requestor associated with the request; verifying the data object using a data verification algorithm to generate a first verification value based at least in part on the first partition size, wherein the first verification value is derived from a second verification value generated based at least in part on at least two of the first plurality of partitions; storing the data object and the first verification value; partitioning the data object into a second plurality of partitions, each partition of the second plurality of partitions having a second partition size different than the first partition size; and verifying the data object using the data verification algorithm by at least; generating a third verification value based at least on the second partition size; and comparing the third verification value with the first verification value. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising at least one computing device configured to implement one or more services, wherein the one or more services at least:
-
receive a selection for a first partition size for a data object; generate, based at least in part on a first verification value generated based at least in part on at least two partitions of the data object partitioned according to the first partition size, a second verification value; generate a third verification value for the data object according to a second partition size for the data object, the second partition size differing from the first partition size; and provide, to an entity from which the selection was received, a verification of the data object based at least in part on a comparison of the second verification value and the third verification value. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable storage medium having stored thereon executable instructions that, as a result of being executed by one or more processors of a computer system, cause the computer system to at least:
-
obtain a first verification value for a data object according to a first partition size selected by a requestor; use a data verification algorithm to generate a second verification value, the second verification value being derived from a third verification value generated based at least in part on at least two partitions of the data object partitioned based at least in part on a second partition size for the data object, the second partition size being different than the first partition size; verify the data object based at least on part whether the second verification value matches the first verification value; and provide an outcome of verifying the data object to the requestor. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification