Auditing data integrity
    1.
    发明授权
    Auditing data integrity 有权
    审计数据完整性

    公开(公告)号:US08392708B2

    公开(公告)日:2013-03-05

    申请号:US12240742

    申请日:2008-09-29

    IPC分类号: H04L9/32

    摘要: Various approaches are described for auditing integrity of stored data. In one approach, a data set is provided from a client to a storage provider, and the data set is stored at a first storage arrangement by the storage provider. An auditor determines whether the data set stored at the first storage arrangement is corrupt without reliance on any part of the data set and any derivative of any part of the data set stored by the client. While the auditor is determining whether the data set stored at the first storage arrangement is corrupt, the auditor is prevented from being exposed to information specified by the data set. The auditor outputs data indicative of data corruption in response to determining that the data set stored at the first storage arrangement is corrupt.

    摘要翻译: 描述了各种方法来审计存储数据的完整性。 在一种方法中,从客户端向存储提供者提供数据集,并且数据集由存储提供商存储在第一存储装置中。 审核员确定存储在第一存储装置中的数据集是否破坏而不依赖于数据集的任何部分以及由客户机存储的数据集的任何部分的任何导数。 虽然审核员正在确定存储在第一存储装置中的数据集是否损坏,但是防止了审核员暴露于由数据集指定的信息。 响应于确定存储在第一存储装置处的数据集已损坏,审计员输出指示数据损坏的数据。

    Auditor assisted extraction and verification of client data returned from a storage provided while hiding client data from the auditor
    2.
    发明授权
    Auditor assisted extraction and verification of client data returned from a storage provided while hiding client data from the auditor 有权
    审计员协助提取和验证从提供的存储返回的客户端数据,同时隐藏审核员的客户端数据

    公开(公告)号:US08281151B2

    公开(公告)日:2012-10-02

    申请号:US12243134

    申请日:2008-10-01

    IPC分类号: H04L29/06

    摘要: Various approaches for extracting client's data from a storage provider are presented. In one approach, an auditor is initialized with a verification data set that confirms that an initial version of a data set stored by the storage provider is intact. The auditor extracts a second version of the data set from the storage provider; the second version hides information specified by the data set from the auditor. The auditor determines whether the second version matches the initial version. The second version is returned to the client if the initial version matches the second version. The auditor is prevented from recovering the information specified by the data set using the state information, and the client need not store any state information related to the initial and second versions needed to recover the information specified by the data set. If the initial version does not match the second version, the auditor outputs data indicative of data corruption.

    摘要翻译: 介绍了从存储提供商提取客户端数据的各种方法。 在一种方法中,审核员被初始化为验证数据集,确认存储提供商存储的数据集的初始版本是完整的。 审核员从存储提供商提取数据集的第二版本; 第二个版本隐藏由审核员指定的数据集的信息。 审核员确定第二个版本是否与初始版本相匹配。 如果初始版本与第二个版本匹配,则第二个版本将返回给客户端。 防止审核员使用状态信息恢复由数据集指定的信息,并且客户端不需要存储与恢复由数据集指定的信息所需的初始和第二版本相关的任何状态信息。 如果初始版本与第二个版本不匹配,则审核员将输出指示数据损坏的数据。

    Auditor Assisted Extraction And Verification Of Client Data Returned From A Storage Provided While Hiding Client Data From The Auditor
    3.
    发明申请
    Auditor Assisted Extraction And Verification Of Client Data Returned From A Storage Provided While Hiding Client Data From The Auditor 有权
    从审计员隐藏客户数据时提供的存储提供的客户数据的审计员协助提取和验证

    公开(公告)号:US20100083001A1

    公开(公告)日:2010-04-01

    申请号:US12243134

    申请日:2008-10-01

    IPC分类号: H04L9/06 G06F17/30

    摘要: Various approaches for extracting client's data from a storage provider are presented. In one approach, an auditor is initialized with a verification data set that confirms that an initial version of a data set stored by the storage provider is intact. The auditor extracts a second version of the data set from the storage provider; the second version hides information specified by the data set from the auditor. The auditor determines whether the second version matches the initial version. The second version is returned to the client if the initial version matches the second version. The auditor is prevented from recovering the information specified by the data set using the state information, and the client need not store any state information related to the initial and second versions needed to recover the information specified by the data set. If the initial version does not match the second version, the auditor outputs data indicative of data corruption.

    摘要翻译: 介绍了从存储提供商提取客户端数据的各种方法。 在一种方法中,审核员被初始化为验证数据集,确认存储提供商存储的数据集的初始版本是完整的。 审核员从存储提供商提取数据集的第二版本; 第二个版本隐藏由审核员指定的数据集的信息。 审核员确定第二个版本是否与初始版本相匹配。 如果初始版本与第二个版本匹配,则第二个版本将返回给客户端。 防止审核员使用状态信息恢复由数据集指定的信息,并且客户端不需要存储与恢复由数据集指定的信息所需的初始和第二版本相关的任何状态信息。 如果初始版本与第二个版本不匹配,则审核员将输出指示数据损坏的数据。

    Auditing Data Integrity
    4.
    发明申请
    Auditing Data Integrity 有权
    审计数据完整性

    公开(公告)号:US20100080391A1

    公开(公告)日:2010-04-01

    申请号:US12240742

    申请日:2008-09-29

    IPC分类号: G06F17/30 H04L9/00

    摘要: Various approaches are described for auditing integrity of stored data. In one approach, a data set is provided from a client to a storage provider, and the data set is stored at a first storage arrangement by the storage provider. An auditor determines whether the data set stored at the first storage arrangement is corrupt without reliance on any part of the data set and any derivative of any part of the data set stored by the client. While the auditor is determining whether the data set stored at the first storage arrangement is corrupt, the auditor is prevented from being exposed to information specified by the data set. The auditor outputs data indicative of data corruption in response to determining that the data set stored at the first storage arrangement is corrupt.

    摘要翻译: 描述了各种方法来审计存储数据的完整性。 在一种方法中,从客户端向存储提供者提供数据集,并且数据集由存储提供商存储在第一存储装置中。 审核员确定存储在第一存储装置中的数据集是否破坏而不依赖于数据集的任何部分以及由客户机存储的数据集的任何部分的任何导数。 虽然审核员正在确定存储在第一存储装置中的数据集是否损坏,但是防止了审核员暴露于由数据集指定的信息。 响应于确定存储在第一存储装置处的数据集已损坏,审计员输出指示数据损坏的数据。

    Encryption key management using distributed storage of encryption-key fragments
    6.
    发明授权
    Encryption key management using distributed storage of encryption-key fragments 有权
    加密密钥管理使用分布式存储的加密密钥片段

    公开(公告)号:US09165158B2

    公开(公告)日:2015-10-20

    申请号:US13817345

    申请日:2010-08-17

    IPC分类号: H04L9/08 G06F21/62

    摘要: An encryption key fragment is divided into a number of encryption key fragments. Requests to store different ones of the encryption key fragments are transmitted to different computer memory storage systems. An individual request to store an encryption key fragment includes one of the encryption key fragments and bears an access control hallmark for regulating access to the encryption key fragment.

    摘要翻译: 加密密钥片段被分成多个加密密钥片段。 存储不同的加密密钥片段的请求被发送到不同的计算机存储器存储系统。 存储加密密钥片段的个人请求包括加密密钥片段中的一个,并且具有用于调节对加密密钥片段的访问的访问控制标志。

    Determining a metric region in a wireless network
    7.
    发明授权
    Determining a metric region in a wireless network 有权
    确定无线网络中的度量标准区域

    公开(公告)号:US08514776B2

    公开(公告)日:2013-08-20

    申请号:US12433717

    申请日:2009-04-30

    IPC分类号: H04W4/00

    摘要: A wireless network metric region in a wireless network is determined using a node metric region and a performance metric. The node metric region, which includes a boundary of the node metric region, for each node is estimated and the performance metric for the node metric region for each node is measured. The boundary of the node metric region for each node is adjusted based on the measured performance metric and then the wireless network metric region for the wireless network is determined based on the adjusted boundaries of the node metric region for each node.

    摘要翻译: 使用节点度量区域和性能度量来确定无线网络中的无线网络度量区域。 估计每个节点包括节点度量区域的边界的节点度量区域,并测量每个节点的节点度量区域的性能度量。 基于测量的性能度量来调整每个节点的节点度量区域的边界,然后基于每个节点的节点度量区域的调整的边界来确定无线网络的无线网络度量区域。

    Selecting erasure codes for a fault tolerant system
    8.
    发明授权
    Selecting erasure codes for a fault tolerant system 有权
    选择容错系统的擦除代码

    公开(公告)号:US08250427B2

    公开(公告)日:2012-08-21

    申请号:US12243471

    申请日:2008-10-01

    IPC分类号: H03M13/00

    摘要: A technique for selecting an erasure code from a plurality of erasure codes for use in a fault tolerant system comprises generating a preferred set of erasure codes based on characteristics of the codes' corresponding Tanner graphs. The fault tolerances of the preferred codes are compared based at least on the Tanner graphs. A more fault tolerant code is selected based on the comparison.

    摘要翻译: 用于从容错系统中使用的多个擦除代码中选择擦除代码的技术包括基于代码对应的Tanner图的特性来产生一组优选的擦除代码。 至少在Tanner图上比较优选代码的容错。 基于比较选择更多的容错代码。

    Windowed backward key rotation
    9.
    发明授权
    Windowed backward key rotation 有权
    向后旋转键

    公开(公告)号:US07697690B2

    公开(公告)日:2010-04-13

    申请号:US10624403

    申请日:2003-07-21

    摘要: Windowed backward key rotation. A user is provided information that allows determining a limited number of previous keys in a series of keys from a later key in the series. A key in the series is generated, based at least in part on the information provided to the user. The key in the series is provided to the user. The user determines at least one key in the limited number of previous keys in the series by applying the information to the key in the series.

    摘要翻译: 向后旋转键。 提供用户被提供的信息,其允许从系列中的稍后的键确定一系列键中的有限数量的先前的键。 至少部分地基于提供给用户的信息来生成系列中的关键。 该系列的关键是提供给用户。 用户通过将该信息应用于该系列中的密钥来确定该系列中有限数量的先前密钥中的至少一个密钥。