US 12,170,717 B2
Managing brute force attacks in a distributed storage system
Jason K. Resch, Warwick, RI (US); Greg R. Dhuse, Chicago, IL (US); and Bart R. Cilfone, Marina del Rey, CA (US)
Assigned to Pure Storage, Inc., Santa Clara, CA (US)
Filed by Pure Storage, Inc., Santa Clara, CA (US)
Filed on Aug. 8, 2023, as Appl. No. 18/366,861.
Application 18/366,861 is a continuation of application No. 17/663,566, filed on May 16, 2022, granted, now 11,728,964.
Application 17/663,566 is a continuation in part of application No. 16/855,395, filed on Apr. 22, 2020, granted, now 11,336,428, issued on May 17, 2022.
Application 16/855,395 is a continuation of application No. 16/053,466, filed on Aug. 2, 2018, granted, now 10,644,874, issued on May 5, 2020.
Application 16/053,466 is a continuation in part of application No. 15/827,073, filed on Nov. 30, 2017, granted, now 10,089,036, issued on Oct. 2, 2018.
Application 15/827,073 is a continuation in part of application No. 14/721,838, filed on May 26, 2015, granted, now 9,841,925, issued on Dec. 12, 2017.
Claims priority of provisional application 62/031,342, filed on Jul. 31, 2014.
Prior Publication US 2023/0388101 A1, Nov. 30, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 15/167 (2006.01); G06F 21/31 (2013.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01); H04L 9/00 (2022.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04L 67/1097 (2022.01); H04L 67/50 (2022.01)
CPC H04L 9/002 (2013.01) [G06F 21/31 (2013.01); G06F 21/602 (2013.01); G06F 21/6218 (2013.01); H04L 9/085 (2013.01); H04L 9/0863 (2013.01); H04L 9/0869 (2013.01); H04L 9/3226 (2013.01); H04L 63/04 (2013.01); H04L 63/06 (2013.01); H04L 67/1097 (2013.01); H04L 67/535 (2022.05)] 20 Claims
OG exemplary drawing
 
1. A method for execution in a storage network, the method comprises:
performing a key derivation function on a first password to produce a key;
issuing a set of second passwords based on the key to a set of storage units, wherein a data object is dispersed error encoded in accordance with dispersed error encoding parameters to produce a set of encoded data slices and wherein the set of encoded data slices are stored in the set of storage units;
receiving a decode threshold number of confidential information responses from the set of storage units;
regenerating a set of keys for the decode threshold number of confidential information responses;
decrypting the confidential information responses using the set of keys to reproduce a set of encoded data slices; and
dispersed storage error decoding the set of encoded data slices to produce recovered data.