Movatterモバイル変換


[0]ホーム

URL:


US20160321133A1 - Verifying accurate storage in a data storage system - Google Patents

Verifying accurate storage in a data storage system
Download PDF

Info

Publication number
US20160321133A1
US20160321133A1US14/874,198US201514874198AUS2016321133A1US 20160321133 A1US20160321133 A1US 20160321133A1US 201514874198 AUS201514874198 AUS 201514874198AUS 2016321133 A1US2016321133 A1US 2016321133A1
Authority
US
United States
Prior art keywords
data file
post
checksum
request
storage system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/874,198
Inventor
David Charles Oliver
Ming-Wei Wang
Dan Winter
Parul Manek
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing LLCfiledCriticalMicrosoft Technology Licensing LLC
Priority to US14/874,198priorityCriticalpatent/US20160321133A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLCreassignmentMICROSOFT TECHNOLOGY LICENSING, LLCASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: OLIVER, DAVID CHARLES, MANEK, PARUL, WINTER, DAN, WANG, MING-WEI
Priority to PCT/US2016/029916prioritypatent/WO2016178928A1/en
Publication of US20160321133A1publicationCriticalpatent/US20160321133A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A post-encryption checksum is generated for a file to be stored on a remote storage location. It can be generated before sending the encrypted file to the remote storage system. A post-write checksum can be received from the remote storage system. The post-write checksum is generated after the encrypted file is written there. A comparison of the two checksums indicates whether the file has been correctly written to the remote storage system.

Description

Claims (20)

What is claimed is:
1. A computing system, comprising:
a data encryption system that receives a data file to be stored on a remote storage system and transforms the data file by encrypting the data file with a file-specific encryption key to obtain an encrypted data file;
a checksum generator component that generates a post-encryption checksum on the encrypted data file;
a communication component that sends the encrypted data file to the remote storage system; and
a checksum comparison system that receives a first post-write checksum from the remote storage system, the first post-write checksum being generated from the encrypted data file after being written to the remote storage system, and compares the first post-write checksum to the post-encryption checksum to determine whether the encrypted data file is correctly written to the remote storage system and generates a comparison output signal indicative of a result of the comparison.
2. The computing system ofclaim 1 wherein the communication component receives a storage request from a client to store the data file on the remote storage system, and wherein the communication component indicates to the client that the data file has been successfully written to the remote storage system, when the comparison output signal indicates that the first post-write checksum and the post-encryption checksum are the same.
3. The computing system ofclaim 1 wherein the communication component sends the encrypted data file to a remote backup storage system for storage on the backup storage system.
4. The computing system ofclaim 3 wherein the checksum comparison system receives a second post-write checksum from the remote backup storage system, the second post-write checksum being generated from the encrypted data file after being written to the remote backup storage system, and compares the second post-write checksum to the post-encryption checksum to determine whether the encrypted data file is correctly written to the remote backup storage system and generates a comparison output signal indicative of a result of the comparison.
5. The computing system ofclaim 4 wherein the computing system receives a storage request from a client to store the data file on the remote storage system, and wherein the communication component indicates to the client that the data file has been successfully written to the remote storage system, when the comparison output signal indicates that the first post-write checksum and the post-encryption checksum are the same, and that the second post-write checksum and the post-encryption checksum are the same.
6. The computing system ofclaim 3 wherein, in response to receiving a data access request, for the data file, from the client, the communication component is configured to send a first request for the encrypted data file to the remote storage location on a first computing thread and to schedule a second request to the remote backup storage location on a second thread to occur after a delay period.
7. The computing system ofclaim 6 wherein the communication component is configured to send the second request to the backup storage location within the delay period if the first request fails within the delay period.
8. The computing system ofclaim 7 wherein the communication component is configured to cancel a given one of the first request and the second request when the encrypted data file is returned in response another one of the first request or the second request.
9. A computer implemented method, comprising:
receiving a data file to be stored on a remote storage system;
transforming the data file by encrypting the data file with a file-specific encryption key to obtain an encrypted data file;
generating a post-encryption checksum on the encrypted data file;
sending the encrypted data file to the remote storage system;
receiving a first post-write checksum from the remote storage system, the first post-write checksum being generated from the encrypted data file after being written to the remote storage system;
comparing the first post-write checksum to the post-encryption checksum to determine whether the encrypted data file; and
generating a comparison output signal indicative of a result of the comparison.
10. The computer implemented method ofclaim 9 wherein receiving the data file includes receiving a storage request from a client to store the data file on the remote storage system.
11. The computer implemented method ofclaim 10 wherein sending the encrypted data file to the remote storage system comprises:
sending the encrypted data file to a remote backup storage system for storage on the backup storage system.
12. The computer implemented method ofclaim 11 and further comprising:
receiving a second post-write checksum from the remote backup storage system, the second post-write checksum being generated from the encrypted data file after being written to the remote backup storage system;
comparing the second post-write checksum to the post-encryption checksum; and
generating a comparison output signal indicative of a result of the comparison.
13. The computer implemented method ofclaim 12 and further comprising:
indicating to the client that the data file has been successfully written to the remote storage system, when the comparison output signal indicates that the first post-write checksum and the post-encryption checksum are the same, and that the second post-write checksum and the post-encryption checksum are the same.
14. The computer implemented method ofclaim 11 and further comprising:
receiving a data access request, for the data file, from the client;
sending a first request for the encrypted data file to the remote storage location on a first computing thread in response to the data request; and
scheduling a second request to the remote backup storage location on a second thread to occur after a delay period, in response to the data request.
15. The computer implemented method ofclaim 14 and further comprising:
detecting that the first request failed within the delay period; and
in response to detecting that the first request failed, sending the second request to the backup storage location within the delay period.
16. The computer implemented method ofclaim 15 and further comprising:
cancelling a given one of the first request and the second request when the encrypted data file is returned in response another one of the first request or the second request.
17. The computer implemented method ofclaim 16 and further comprising:
decrypting the encrypted data file with the file-specific encryption key; and
returning the data file to the client in response to the data request.
18. A computing system, comprising:
a communication component configured to receive a storage request from a client to store the data file on the remote storage system;
a data encryption system configured to transform the data file by encrypting the data file with a file-specific encryption key to obtain an encrypted data file, the communication component sending the encrypted data file to the remote storage system and a backup remote storage system;
a checksum generator component that generates a post-encryption checksum on the encrypted data file; and
a checksum comparison system that receives a first post-write checksum from the remote storage system and a second post-write checksum from the backup remote storage system, the first post-write checksum being generated from the encrypted data file after being written to the remote storage system, and the second post-write checksum being generated from the encrypted data file after being written to the remote backup storage system, the checksum comparison system comparing the first post-write checksum to the post-encryption checksum and comparing the second post-write checksum to the post-encryption checksum and generating a comparison output signal indicative of a result of the comparison, the communication component confirming to the client that the data file is successfully stored on the remote storage location if the comparison signal indicates that the post-encryption checksum is the same as both the first and second post-write checksums.
19. The computing system ofclaim 18 wherein, in response to receiving a data access request for the data file from the client, the communication component is configured to send a first request for the encrypted data file to the remote storage location on a first computing thread and to schedule a second request to the remote backup storage location on a second thread to be sent after a delay period, and wherein the communication component is configured to send the second request to the backup storage location within the delay period if the first request fails within the delay period.
20. The computing system ofclaim 19 wherein the communication component is configured to cancel a given one of the first request and the second request when the encrypted data file is returned in response to another one of the first request or the second request.
US14/874,1982015-05-012015-10-02Verifying accurate storage in a data storage systemAbandonedUS20160321133A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US14/874,198US20160321133A1 (en)2015-05-012015-10-02Verifying accurate storage in a data storage system
PCT/US2016/029916WO2016178928A1 (en)2015-05-012016-04-29Verifying accurate storage in a data storage system

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201562155886P2015-05-012015-05-01
US201562155975P2015-05-012015-05-01
US14/874,198US20160321133A1 (en)2015-05-012015-10-02Verifying accurate storage in a data storage system

Publications (1)

Publication NumberPublication Date
US20160321133A1true US20160321133A1 (en)2016-11-03

Family

ID=57204938

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US14/874,198AbandonedUS20160321133A1 (en)2015-05-012015-10-02Verifying accurate storage in a data storage system
US14/874,125ActiveUS10050780B2 (en)2015-05-012015-10-02Securely storing data in a data storage system
US16/036,035Active2035-10-14US10826689B2 (en)2015-05-012018-07-16Securely storing data in a data storage system

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US14/874,125ActiveUS10050780B2 (en)2015-05-012015-10-02Securely storing data in a data storage system
US16/036,035Active2035-10-14US10826689B2 (en)2015-05-012018-07-16Securely storing data in a data storage system

Country Status (2)

CountryLink
US (3)US20160321133A1 (en)
WO (2)WO2016178927A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160285632A1 (en)*2015-03-242016-09-29Canon Kabushiki KaishaInformation processing apparatus, encryption apparatus, and control method
US11068606B2 (en)*2017-09-202021-07-20Citrix Systems, Inc.Secured encrypted shared cloud storage
US20220335147A1 (en)*2021-04-142022-10-20Bank Of America CorporationSystem for implementing enhanced file encryption technique
US11606104B1 (en)*2021-12-082023-03-14Amazon Technologies, Inc.Data integrity protection

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160321133A1 (en)*2015-05-012016-11-03Microsoft Technology Licensing, LlcVerifying accurate storage in a data storage system
US10581617B2 (en)2015-12-232020-03-03Mcafee, LlcMethod and apparatus for hardware based file/document expiry timer enforcement
US10127399B1 (en)*2015-12-292018-11-13EMC IP Holding Company LLCSecrets as a service
US10601782B2 (en)*2016-04-012020-03-24Egnyte, Inc.Systems and methods for proxying encryption key communications between a cloud storage system and a customer security module
US10187203B2 (en)*2016-08-302019-01-22Workday, Inc.Secure storage encryption system
US10177908B2 (en)*2016-08-302019-01-08Workday, Inc.Secure storage decryption system
US10460118B2 (en)2016-08-302019-10-29Workday, Inc.Secure storage audit verification system
US10469254B2 (en)2017-03-292019-11-05Intuit Inc.Method and system for hierarchical cryptographic key management
US10491576B1 (en)*2017-06-162019-11-26Intuit Inc.System and method for security breach response using hierarchical cryptographic key management
CN109561047B (en)2017-09-262021-04-13安徽问天量子科技股份有限公司Encrypted data storage system and method based on key remote storage
US11768763B2 (en)*2020-07-082023-09-26Pure Storage, Inc.Flash secure erase
DE102020213611A1 (en)2020-10-292022-05-05Robert Bosch Gesellschaft mit beschränkter Haftung Procedure for applying cryptographic functions to data using different keys
US20230102111A1 (en)*2021-09-302023-03-30Lenovo Global Technology (United States) Inc.Securing customer sensitive information on private cloud platforms

Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030191955A1 (en)*2001-05-102003-10-09Ranco Incorporated Of DelawareSystem and method for securely upgrading firmware
US20060026347A1 (en)*2004-07-292006-02-02Ching-Hai HungMethod for improving data reading performance and storage system for performing the same
US20080270834A1 (en)*2007-04-242008-10-30Nanya Technology CorporationControl method for read operation of memory
US20100306578A1 (en)*2005-09-302010-12-02Cleversafe, Inc.Range based rebuilder for use with a dispersed data storage network
US20120042162A1 (en)*2010-08-122012-02-16International Business Machines CorporationCloud Data Management
US20140359276A1 (en)*2013-05-302014-12-04Cleversafe, Inc.Securing data in a dispersed storage network

Family Cites Families (36)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4317957A (en)*1980-03-101982-03-02Marvin SendrowSystem for authenticating users and devices in on-line transaction networks
US4503287A (en)*1981-11-231985-03-05Analytics, Inc.Two-tiered communication security employing asymmetric session keys
US4731840A (en)*1985-05-061988-03-15The United States Of America As Represented By The United States Department Of EnergyMethod for encryption and transmission of digital keying data
US4941176A (en)*1988-08-111990-07-10International Business Machines CorporationSecure management of keys using control vectors
US5940507A (en)*1997-02-111999-08-17Connected CorporationSecure file archive through encryption key management
EP1650757A1 (en)1997-05-132006-04-26Kabushiki Kaisha ToshibaInformation ciphering method and apparatus, information reproducing method and apparatus
US8335915B2 (en)2002-05-142012-12-18Netapp, Inc.Encryption based security system for network storage
JP2004254027A (en)2003-02-192004-09-09Toshiba Corp Server device, key management device, encryption communication method, and program
WO2006017362A2 (en)*2004-07-132006-02-16Freedom Software, Inc.Storing and distributing encrypted digital content
US7472332B2 (en)2005-07-262008-12-30International Business Machines CorporationMethod for the reliability of host data stored on fibre channel attached storage subsystems
CA2618135C (en)*2005-08-092014-10-28Nexsan Technologies Canada Inc.Data archiving system
US20100316219A1 (en)2007-08-062010-12-16David BoubionSystems and methods for simultaneous integrated multiencrypted rotating key communication
EP2186250B1 (en)*2007-08-312019-03-27IP Reservoir, LLCMethod and apparatus for hardware-accelerated encryption/decryption
WO2010002408A1 (en)2008-07-022010-01-07Hewlett-Packard Development Company, L.P.Verification of remote copies of data
US8335933B2 (en)2009-02-132012-12-18Microsoft CorporationTwo-party storage of encrypted sensitive information
US8117496B2 (en)2009-06-182012-02-14International Business Machines CorporationDetecting and recovering from silent data errors in application cloning systems
US20110055559A1 (en)2009-08-272011-03-03Jun LiData retention management
US8364985B1 (en)2009-12-112013-01-29Network Appliance, Inc.Buffer-caches for caching encrypted data via copy-on-encrypt
US8495472B1 (en)2010-08-062013-07-23Amazon Technologies, Inc.Method and system for performing financial reconciliation between two systems using checksums
US20120117040A1 (en)2010-11-102012-05-10Oracle International CorporatonMethod and System for Verifying Data Stored on a Medium
US20120179909A1 (en)2011-01-062012-07-12Pitney Bowes Inc.Systems and methods for providing individual electronic document secure storage, retrieval and use
US8788815B1 (en)2011-01-312014-07-22Gazzang, Inc.System and method for controlling access to decrypted data
US8943315B1 (en)2011-06-082015-01-27Google Inc.System and method for controlling the upload of data already accessible to a server
US8806269B2 (en)2011-06-282014-08-12International Business Machines CorporationUnified, workload-optimized, adaptive RAS for hybrid systems
US8862889B2 (en)*2011-07-022014-10-14Eastcliff LLCProtocol for controlling access to encryption keys
US8745384B2 (en)*2011-08-112014-06-03Cisco Technology, Inc.Security management in a group based environment
US8621196B2 (en)*2011-10-282013-12-31Verizon Patent And Licensing Inc.Booting from an encrypted ISO image
US8856519B2 (en)2012-06-302014-10-07International Business Machines CorporationStart method for application cryptographic keystores
US9316890B2 (en)2012-08-012016-04-19Ricoh Company, Ltd.Projector positioning
US8862561B1 (en)2012-08-302014-10-14Google Inc.Detecting read/write conflicts
US8868834B2 (en)2012-10-012014-10-21Edgecast Networks, Inc.Efficient cache validation and content retrieval in a content delivery network
US9628268B2 (en)*2012-10-172017-04-18Box, Inc.Remote key management in a cloud-based environment
US20140300983A1 (en)2013-04-052014-10-09Front Porch Digital, Inc.Media storage and management system
US9397832B2 (en)*2014-08-272016-07-19International Business Machines CorporationShared data encryption and confidentiality
US9397833B2 (en)*2014-08-272016-07-19International Business Machines CorporationReceipt, data reduction, and storage of encrypted data
US20160321133A1 (en)*2015-05-012016-11-03Microsoft Technology Licensing, LlcVerifying accurate storage in a data storage system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20030191955A1 (en)*2001-05-102003-10-09Ranco Incorporated Of DelawareSystem and method for securely upgrading firmware
US20060026347A1 (en)*2004-07-292006-02-02Ching-Hai HungMethod for improving data reading performance and storage system for performing the same
US20100306578A1 (en)*2005-09-302010-12-02Cleversafe, Inc.Range based rebuilder for use with a dispersed data storage network
US20080270834A1 (en)*2007-04-242008-10-30Nanya Technology CorporationControl method for read operation of memory
US20120042162A1 (en)*2010-08-122012-02-16International Business Machines CorporationCloud Data Management
US20140359276A1 (en)*2013-05-302014-12-04Cleversafe, Inc.Securing data in a dispersed storage network

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20160285632A1 (en)*2015-03-242016-09-29Canon Kabushiki KaishaInformation processing apparatus, encryption apparatus, and control method
US10038556B2 (en)*2015-03-242018-07-31Canon Kabushiki KaishaInformation processing apparatus, encryption apparatus, and control method
US11068606B2 (en)*2017-09-202021-07-20Citrix Systems, Inc.Secured encrypted shared cloud storage
US20220335147A1 (en)*2021-04-142022-10-20Bank Of America CorporationSystem for implementing enhanced file encryption technique
US11610004B2 (en)*2021-04-142023-03-21Bank Of America CorporationSystem for implementing enhanced file encryption technique
US20230169190A1 (en)*2021-04-142023-06-01Bank Of America CorporationSystem for implementing enhanced file encryption technique
US20230177178A1 (en)*2021-04-142023-06-08Bank Of America CorporationSystem for implementing enhanced file encryption technique
US11899803B2 (en)*2021-04-142024-02-13Bank Of America CorporationSystem for implementing enhanced file encryption technique
US11928223B2 (en)*2021-04-142024-03-12Bank Of America CorporationSystem for implementing enhanced file encryption technique
US11606104B1 (en)*2021-12-082023-03-14Amazon Technologies, Inc.Data integrity protection

Also Published As

Publication numberPublication date
US10826689B2 (en)2020-11-03
US20160321461A1 (en)2016-11-03
US10050780B2 (en)2018-08-14
WO2016178927A1 (en)2016-11-10
WO2016178928A1 (en)2016-11-10
US20190081775A1 (en)2019-03-14

Similar Documents

PublicationPublication DateTitle
US10826689B2 (en)Securely storing data in a data storage system
US9992172B2 (en)Secure key management in a data storage system
US10775956B2 (en)Electronic data storage re-sharing notification
EP3186746B1 (en)Sharing content with permission control using near field communication
US9111110B2 (en)Retroactive shared content item links
US20140032228A1 (en)Security and data isolation for tenants in a business data system
US20150059004A1 (en)System, method, and computer program product for creation, transmission,and tracking of electronic document
US10726146B2 (en)Data custodian model and platform for public clouds
US10547621B2 (en)Persistent mutable sharing of electronic content
JP2018536207A (en) Synchronization protocol for multi-premises hosting of digital content items
US20180124155A1 (en)Network-based group communication and file sharing system
US10944752B2 (en)Transfer of secure external sharing link
US20210232673A1 (en)Securing physical access to file contents
US20240037066A1 (en)File access permission revocation notification
US20180262486A1 (en)Quick response (qr) code for secure provisioning
US20170364692A1 (en)Electronic file sharing link granularity
US11777798B2 (en)Cloud-mastered settings
US10530860B2 (en)Single multi-instance tenant computing system

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:OLIVER, DAVID CHARLES;WANG, MING-WEI;WINTER, DAN;AND OTHERS;SIGNING DATES FROM 20151005 TO 20151030;REEL/FRAME:036934/0842

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp