Patent classifications
H04L2209/34
DETERMINING COMPLETION OF MIGRATION IN A DISPERSED STORAGE NETWORK
A method for determining completion of a data migration that results from a distributed agreement protocol (DAP) change within a distributed storage network (DSN). The method begins by transferring, in accordance with the DAP change, encoded data slices to one or more other storage units within the DSN. The method continues by maintaining a storage unit migration tracking repository that tracks migration of the encoded data slices. The method continues by maintaining a storage pool migration tracking repository based on the storage unit migration tracking repositories of the plurality of storage units. The method continues by maintaining a DSN migration tracking repository based on the storage pool migration tracking repositories of the plurality of storage pools. The method continues by indicating completion of the data migration as a result of the DAP change based on information within the DSN tracking repository.
SRAM-BASED AUTHENTICATION CIRCUIT
An authentication circuit coupled to a plurality of memory bits includes a monitoring engine configured to provide a first data pattern to all the bits thereby causing each bit to be in a first data state, detect whether a transition from the first data state to a second data state occurs for each bit in response to a first reducing voltage applied to the plurality of bits, provide a second data pattern to all the bits thereby causing each bit to be in the second data state, and detect whether a transition from the second data state to the first data state occurs for each bit in response to a second reducing voltage applied to the plurality of bits, wherein the first data state is different from the second data state, and a PUF controller configured to generate a PUF signature based on the transitions of each bit.
Iterative data secret-sharing transformation
Provided are a method, system, and article of manufacture for iterative data secret-sharing transformation and reconversion. In one aspect, data secret-sharing transformation and reconversion is provided in which each bit of an input stream of bits of data is split, on a bit by bit basis, into a pair of secret-sharing bits, and the secret-sharing bits of each pair of secret-sharing bits are separated into separate streams of secret-sharing bits. In this manner, one secret-sharing bit of each pair of secret-sharing bits may be placed in one stream of secret-sharing bits and the other secret-sharing bit of each pair may be placed in another stream of secret-sharing bits different from the one stream of secret-sharing bits. Confidentiality of the original input stream may be protected in the event one but not both streams of secret-sharing bits is obtained by unauthorized personnel. In another aspect, for an input stream of N bits, each received bit of the N bits of the input stream of data, may be interatively split, on a bit by bit basis, into a pair of secret-sharing bits, to generate as few as N+1 secret-sharing bits from the input stream of bits N bits. Other features and aspects may be realized, depending upon the particular application.
Video acquisition method and device
A video acquisition method and device. The method includes setting a video acquisition class in a programming language framework layer. With the video acquisition class inherits a class in a video acquisition underlying library and registers a callback function for the video acquisition underlying library. The video acquisition class sends a video acquisition command to the video acquisition underlying library and the video acquisition underlying library acquires video data according to the video acquisition command. The callback function is applied to acquire the video data from the video acquisition underlying library and the video data is sent to a coder for video data coding.
Distributed storage network and method for storing and retrieving encryption keys
A method for execution by a computing device of a dispersed storage network (DSN). The method begins by encrypting a data segment of a data object using a security key to produce an encrypted data segment. The method continues by dispersed storage error encoding the encrypted data segment to produce a set of encoded data slices and sending the set of encoded data slices to storage units of the DSN for storage. The method continues by encrypting the security key using an encryption key to produce an encrypted security key and dispersed storage error encoding the encrypted security key to produce a set of encoded key slices, wherein a decode threshold number of encoded key slices is needed to recover the encrypted security key. The method continues by sending the set of encoded key slices to a set of storage units of the DSN for storage therein.
METHOD FOR PROVIDING SCHEDULERS IN A DISTRIBUTED STORAGE NETWORK
A method for selecting a substantially optimized scheduler from a plurality of schedulers for executing dispersed storage error functions on a distributed storage network begins with a computing device receiving a dispersed storage error functions along with an indication of measured throughput and measured latency from a requesting device. The method resumes when a scheduler is selected from the plurality of schedulers based on desired latency and throughput, while considering the characteristics of the dispersed error function being executed. The method continues with the computing device receiving a different dispersed error function and selecting a different scheduler.
Conditional hardware acceleration of secure forward error correction (FEC) processing
It is determined whether hardware acceleration is available for the incoming data packet. Responsive to hardware acceleration availability, and based on the received FEC conditions, it is determined, for a session associated with the incoming data packet, whether to hardware decrypt the incoming data packet before decoding the incoming data packet or to hardware decrypt after decoding the incoming data packet.
CRYPTOGRAPHIC KEY GENERATION AND DISTRIBUTION
Methods, apparatuses, systems, and program products are disclosed for cryptographic key generation and distribution. A method includes generating a cryptographic key that may be divided into a plurality of key segments such that the key is re-constructed by combining each of the plurality of key segments. A method includes assigning each of a plurality of users to one or more groups. A method includes mapping each of a plurality of key segments of a key to one or more of a plurality of users as a function of a number of users within each group. A method includes encoding each of a plurality of key segments in a predefined format based on a mapping. A method includes distributing each of a plurality of encoded key segments to each of one or more users that is mapped to each encoded key segment.
Generation and verification of alternate data having specific format
The method for encoding a character string by a data processing device disclosed in the present specification comprises the steps of: acquiring input data; performing a one-way function to generate ciphertext based on the input data; and converting the ciphertext to output data. In the conversion step, the output characters constituting the output data are selected from the group of input characters constituting the input data, and the length of the output data becomes a specific length.
Serial transmission having a low level EMI
A method for transmitting data in series includes producing a scrambled signal by applying a scrambling using a pseudo-random sequence to an incoming serial signal conveying the data and producing an outgoing serial signal. The scrambled signal is monitored to detect occurrences of one or more data patterns. In response to the detection of one or more occurrences, one or more actions are taken to protect data in the output signal.