Google llc (20240111884). Authenticating a File System Within Untrusted Storage simplified abstract
Contents
- 1 Authenticating a File System Within Untrusted Storage
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 Authenticating a File System Within Untrusted Storage - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does this technology compare to traditional file system authentication methods?
- 1.11 What are the potential limitations or drawbacks of implementing this technology?
- 1.12 Original Abstract Submitted
Authenticating a File System Within Untrusted Storage
Organization Name
Inventor(s)
Yu-Ting Hsieh of Sunnyvale CA (US)
Authenticating a File System Within Untrusted Storage - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240111884 titled 'Authenticating a File System Within Untrusted Storage
Simplified Explanation
The patent application describes techniques for authenticating a file system within untrusted storage by generating a file-system root hash corresponding to the file system during a write operation. The root hash is uniquely determined based on the contents of files within the file system and the structure of the file system. The size of the root hash is independent of the size of the file system, allowing for a dynamically-changing file system and predetermined, fixed storage for the root hash.
- File-system authenticator generates a root hash during a write operation.
- Root hash is uniquely determined based on file contents and structure.
- Root hash size is independent of file system size.
- Enables support for dynamically-changing file systems.
- Predetermined, fixed storage for the root hash.
Potential Applications
The technology described in the patent application could be applied in various industries and scenarios, including:
- Cloud storage services
- Data centers
- Network security systems
Problems Solved
The innovation addresses several issues in file system authentication, such as:
- Ensuring data integrity in untrusted storage environments
- Supporting dynamically-changing file systems
- Efficiently storing authentication data
Benefits
The technology offers the following benefits:
- Enhanced security for file systems in untrusted storage
- Flexibility to accommodate changing file system structures
- Efficient use of storage space for authentication data
Potential Commercial Applications
The technology could be commercially applied in:
- Cybersecurity software solutions
- Cloud storage platforms
- Data backup services
Possible Prior Art
One possible prior art related to this technology is the use of cryptographic hash functions for file system authentication in secure storage environments.
Unanswered Questions
How does this technology compare to traditional file system authentication methods?
The article does not provide a direct comparison between this technology and traditional file system authentication methods.
What are the potential limitations or drawbacks of implementing this technology?
The article does not discuss any potential limitations or drawbacks of implementing this technology.
Original Abstract Submitted
this document includes techniques, apparatuses, and systems for authenticating a file system () within untrusted storage (). in particular, a file-system authenticator () generates a file-system root hash () corresponding to the file system () during a write operation. the file-system root hash () is uniquely determined based on contents of files within the file system () and a structure of the file system (). the file-system root hash () can be readily updated, which enables the file system to support a dynamically-changing file system (). also, the size of the file-system root hash () is independent of the size of the file system () within the untrusted storage (). as such, the size of trusted storage () used to store the file-system root hash () can be predetermined and fixed regardless of the size of the file system ().