The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
May. 28, 2013

Filed:

Aug. 14, 2009
Applicants:

Matthew J. Anglin, Tucson, AZ (US);

David M. Cannon, Tucson, AZ (US);

Avishai H. Hochberg, San Jose, CA (US);

Alexei Kojenov, Beaverton, OR (US);

James P. Smith, Redwood City, CA (US);

Mark L. Yakushev, San Jose, CA (US);

Inventors:

Matthew J. Anglin, Tucson, AZ (US);

David M. Cannon, Tucson, AZ (US);

Avishai H. Hochberg, San Jose, CA (US);

Alexei Kojenov, Beaverton, OR (US);

James P. Smith, Redwood City, CA (US);

Mark L. Yakushev, San Jose, CA (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
Abstract

The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.


Find Patent Forward Citations

Loading…