US 11,991,279 B2
Resilient secret sharing cloud based architecture for data vault
David Lanc, Edinburgh (GB); Lu Fan, Edinburgh (GB); Lachlan Mackinnon, Keith (GB); and Bill Buchanan, Edinburgh (GB)
Assigned to LEADING SOFTWARE LIMITED, Edinburgh (GB)
Filed by LEADING SOFTWARE LIMITED, Edinburgh (GB)
Filed on Apr. 5, 2021, as Appl. No. 17/222,267.
Application 15/383,540 is a division of application No. 15/216,176, filed on Jul. 21, 2016, abandoned.
Application 17/222,267 is a continuation of application No. 15/383,540, filed on Dec. 19, 2016, granted, now 10,979,222.
Application 15/216,176 is a continuation of application No. PCT/GB2016/052009, filed on Jul. 1, 2016.
Claims priority of provisional application 62/188,058, filed on Jul. 2, 2015.
Prior Publication US 2021/0234682 A1, Jul. 29, 2021
Int. Cl. H04L 9/08 (2006.01); H04L 9/14 (2006.01); H04L 9/40 (2022.01)
CPC H04L 9/0894 (2013.01) [H04L 9/085 (2013.01); H04L 9/14 (2013.01); H04L 63/20 (2013.01); H04L 2209/08 (2013.01); H04L 2209/24 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method of securely storing data in a cloud-based vault, the method of securely storing data comprising:
providing, within a secure data storage system, a plurality of secret sharing methods for selection;
receiving input preferences from a user or administrator by a policy module that relate at least to a striping policy;
identifying, by the policy module, a striping policy for storage of the data, in accordance with the input preferences;
splitting the data, by a secret sharing module, into a plurality, N, of secret shares according to a selected one of the plurality of secret sharing methods, a selection of the selected one of the plurality of secret sharing methods being determined by the striping policy, wherein a threshold number, T, of such shares is sufficient to recover the data, where T is less than N,
generating, by a metadata module, metadata associated with the data, the metadata identifying the selected one of the plurality of secret sharing methods and storing the metadata for all the secret shares within the secure data storage system; and
writing, by the secret sharing module, the secret shares to storage including an independent storage and the secure data storage system, the independent storage being implemented outside the secure data storage system, and writing at least some of the secret shares to the independent storage outside the secure data storage system, such that, when at least T shares are retrieved by the secure data storage system, the metadata can be recalled within the secure data storage system to identify the selected one of the plurality of secret sharing methods for recovery of the data,
wherein the input preferences identify a level of resilience and/or a level of security that are utilized to at least enable a user or administrator to select policy attributes that determine values of T and N.