Patent classifications
G06F21/1083
Network system to distribute chunks across multiple physical nodes
A method of storing a file in a storage system that includes a plurality of memory-storage hosts includes: providing unique chunk identifiers for memory chunks included in the file; using a hash mapping to identify one or more storage locations for each chunk identifier, each storage location corresponding to a portion of a memory-storage host; and storing each memory chuck at the corresponding one or more storage locations identified by the hash mapping.
DISPERSED STORAGE NETWORK (DSN) AND SYSTEM WITH IMPROVED SECURITY
A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and to the memory, wherein the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations including to receive, via the interface, content retrieval messages for a data object. Then, based on the content retrieval messages for the data object and respectively for each associated data segment, the processing module determines respective groups of unique pillar combinations of at least read threshold number of EDSs, retrieves the respective groups of unique pillar combinations of at least read threshold number of EDSs from storage units (SUs) within the DSN, and provides the respective groups of unique pillar combinations of at least read threshold number of EDSs respectively to recipient device(s).
Dispersed storage network (DSN) and system with improved security
A computing device includes an interface configured to interface and communicate with a dispersed storage network (DSN), a memory that stores operational instructions, and a processing module operably coupled to the interface and to the memory, wherein the processing module, when operable within the computing device based on the operational instructions, is configured to perform various operations including to receive, via the interface, content retrieval messages for a data object. Then, based on the content retrieval messages for the data object and respectively for each associated data segment, the processing module determines respective groups of unique pillar combinations of at least read threshold number of EDSs, retrieves the respective groups of unique pillar combinations of at least read threshold number of EDSs from storage units (SUs) within the DSN, and provides the respective groups of unique pillar combinations of at least read threshold number of EDSs respectively to recipient device(s).
Intelligent network streaming and execution system for conventionally coded applications
Installation of an application on a test bed machine is monitored to generate a streamed application set of a stream enabled version of the application. Execution of the application on the test bed machine is monitored to generate the streamed application set of the stream enabled version of the application. Stream enabled application pages and a stream enabled application install block to form the streamed application set is generated based on the monitoring of the installation of the application and the monitoring of the execution of the application on the test bed machine. The stream enabled application install block is provided to a client device. A request for a stream enabled application page of the stream enabled application pages is received from the client device. The stream enabled application page is provided to the client device for continued execution of the stream enabled version of the application.
Method and apparatus for providing content protection in a computer system
A computer system includes a server device which provides one or more content packages each comprising a plurality of asset files. A client device stores the content packages, and generates a virtual environment based on the asset files to be displayed on a display unit. A tracker is arranged to record an asset list directly or indirectly representing a sequence of the asset files according to progress through the virtual environment at the client device, and to distinguish between legitimate and non-legitimate behavior of the client device according to the recorded asset list.
SLICE STORAGE IN A DISPERSED STORAGE NETWORK
A method for use in a dispersed storage network (DSN) operates to output at least a write threshold number of write slice requests to a set of storage units of the DSN and receive write slice responses from the set of storage units. When the write threshold number of favorable write slice responses is received, the method includes generating a corresponding number of commit requests and outputting the number of commit requests to associated storage units corresponding to the write threshold number of favorable write slice responses received.
Systems and methods to deliver content during client authentication process in a distributed computing system
A method includes receiving, by a content distribution network server, a first request for content, the first request for content comprising an identifier of a location of the content. Playback of the requested content is caused to begin at a client device. A content-based authentication token generated by the client device is received, wherein the content-based authentication token is associated with a second request for content that is initiated by the client device, and the content-based authentication token is sent for verification by a content sharing platform. Responsive to receiving an indication that the content-based authentication token is valid, playback of the requested content is caused to continue at the client device.
SEPARATING THE AUTHORIZATION OF CONTENT ACCESS AND CONTENT DELIVERY USING MULTIPLE CRYPTOGRAPHIC DIGITAL SIGNATURES
Access control is a building block for the over-all security of any communication system. When it comes to device-to-device communication, decentralized approaches for access control will allow governing a mass of devices in a scalable mode. Common understanding and standardization of application-level access control is also primordial for the incoming era of cooperating devices in the IoT. This article introduces different architectural models for decentralized device access control, their security requirements and implications.