Browse Prior Art Database

A Method and System for Enabling Restricted Anonymous Access Operations

IP.com Disclosure Number: IPCOM000249435D
Publication Date: 2017-Feb-27
Document File: 1 page(s) / 20K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method and system is disclosed for enabling restricted anonymous access operations. The method and system allows a client to utilize fine-grained permissions to restrict anonymous access operations to a Dispersed Storage Network (DSN) memory.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

1

A Method and System for Enabling Restricted Anonymous Access Operations

Disclosed is a method and system for enabling restricted anonymous access operations. The method and system allows a client to create fine-grained permissions to restrict anonymous access operations to a Dispersed Storage Network (DSN) memory.

The method and system establishes an identity to a client using fixed-credentials to perform read or write operations to the DSN memory. In a scenario, the method and system allows applications with transient clients which may include, but need not be limited to a mobile application, web browsers and the like to perform read or write operations with the DSN memory by requesting credentials from a credential server. The transient client requests a temporary credential from the credential server, which may be a DS processing unit or a manager or some other unit that serves the temporary credentials. The type of temporary credentials returned to the transient client can be, but need not be limited to, time based tokens or request specific signatures. Once, the temporary credentials are received by the transient client, the transient client is allowed to perform an operation, which can be, but need not be limited to read, write, update, overwrite and the like against the DS processing unit. Then, the DS processing unit validates the temporary credential and allows or denies the operation.

Further, the method and system allows fine-grained permissions with the temporary credentials by optionally providing a policy whic...