Metadata Based Listing in a Distributed Storage System

    公开(公告)号:US20220066879A1

    公开(公告)日:2022-03-03

    申请号:US17454125

    申请日:2021-11-09

    Abstract: A method for execution by storage network begins by identifying a subset of encoded data slices stored in a set of storage units for enhanced access and interpreting registry data to determine a listing type. The method continues by generating listing slice names for the subset of encoded data slices based on the listing type and sending the listing slice names to the set of storage units, where each storage unit updating storage and/or listing of at least some of the subset of encoded data slices associated with the storage unit based on the listing type and each storage unit issuing slice access information to a requesting entity in response to one or more slice access requests in accordance with the listing type for some of the subset of encoded data slices and the requesting entity receiving slice access information from at least some of the set of storage units.

    Managing brute force attacks in a distributed storage system

    公开(公告)号:US12170717B2

    公开(公告)日:2024-12-17

    申请号:US18366861

    申请日:2023-08-08

    Abstract: A method for execution in a storage network begins by performing a key derivation function on a password to produce a key and issuing a set of passwords based on the key to a set of storage units, where a data object is dispersed error encoded in accordance with dispersed error encoding parameters to produce a set of encoded data slices and the set of encoded data slices are stored in the set of storage units. The method continues, by receiving at least a decode threshold number of confidential information responses from the set of storage units and regenerating a set of keys for the confidential information responses. The method then continues by decrypting the confidential information responses using the set of keys to reproduce a set of encoded data slices and dispersed storage error decoding a decode threshold number of the set of encoded data slices to produce recovered data.

    Processing of a vault provisioning request within a data storage system

    公开(公告)号:US11604587B1

    公开(公告)日:2023-03-14

    申请号:US16660882

    申请日:2019-10-23

    Abstract: A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and memory such that the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations. The computing device receives, from another computing device, a vault provisioning request and processes the vault provisioning request to determine whether the other computing device is authorized to request provisioning of another vault within the DSN. When the other computing device is authorized, the computing device generates a vault within the DSN in response to the vault provisioning request from the other computing device and updates access control information within the DSN to include an initial access control for the vault and an identifier of the other computing device.

    Blinded passwords for a distributed storage system

    公开(公告)号:US11336428B1

    公开(公告)日:2022-05-17

    申请号:US16855395

    申请日:2020-04-22

    Abstract: A method for execution by one or more processing modules of one or more computing devices of a dispersed storage network (DSN), the method begins by performing a key derivation function on a password and issuing a set of blinded passwords to a set of storage units. The method continues by receiving at least a decode threshold number of confidential information responses, regenerating a set of keys using the associated passkeys of the confidential information, decrypting a set of encrypted slices of the confidential information using the set of keys to reproduce a set of encoded data slices, and dispersed storage error decoding a decode threshold number of the set of reproduced encoded data slices to produce recovered data.

    Vault transformation within a storage network

    公开(公告)号:US11321172B1

    公开(公告)日:2022-05-03

    申请号:US16840196

    申请日:2020-04-03

    Abstract: A method includes identifying an existing logical storage vault having existing dispersed storage coding properties for vault transformation, where a first set of storage units support the existing logical storage vault, and a data object of first data objects stored within the first set of storage units is stored as a first plurality of sets of encoded data slices in accordance with the existing dispersed storage coding properties. The method includes identifying a new logical storage vault having new dispersed storage coding properties, wherein storage units support the new logical storage vault. The method includes transforming the first data objects from being in accordance with the existing dispersed storage coding properties to being in accordance with the new dispersed storage coding properties to produce transformed first data objects. The method includes storing the transformed first data objects in the new logical storage vault supported by the storage units.

    Storing a credential in a storage network

    公开(公告)号:US11068163B1

    公开(公告)日:2021-07-20

    申请号:US16807076

    申请日:2020-03-02

    Abstract: A method for execution by a computing device of a storage network begins by obtaining a credential to be added to a local authentication list, where the credential authenticates, during a first time period, at least one of an access request and a requesting device, and where the local authentication list is stored in temporary memory of the computing device and is stored as a plurality of sets of encoded authentication slices in a set of storage units. The method continues by updating the local authentication list stored in the temporary memory to include a representation of the credential. The method continues by encoding the representation to produce a set of encoded authentication slices, where a decode threshold number of encoded authentication slices is needed to recover the representation. The method continues by sending the set of encoded authentication slices to the set of storage units for storage therein.

Patent Agency Ranking