17809348. GENERATIONAL ACCESS TO SAFEGUARDED COPY SOURCE VOLUMES simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)

From WikiPatents
Jump to navigation Jump to search

GENERATIONAL ACCESS TO SAFEGUARDED COPY SOURCE VOLUMES

Organization Name

INTERNATIONAL BUSINESS MACHINES CORPORATION

Inventor(s)

Theresa Mary Brown of Tucson AZ (US)

Dale F Riedy of Poughkeepsie NY (US)

William J. Rooney of Hopewell Junction NY (US)

Scott B. Compton of Hyde Park NY (US)

Gregory Edward Mcbride of Vail AZ (US)

John R. Paveza of Morgan Hill CA (US)

GENERATIONAL ACCESS TO SAFEGUARDED COPY SOURCE VOLUMES - A simplified explanation of the abstract

This abstract first appeared for US patent application 17809348 titled 'GENERATIONAL ACCESS TO SAFEGUARDED COPY SOURCE VOLUMES

Simplified Explanation

Ensuring recoverability and usability of potentially corrupted enterprise data by creating safeguarded copy volumes.

  • Detecting data corruption and locating the last known uncorrupted copy quickly.
  • Initiating restoration process with the identified uncorrupted data and reapplying subsequent logged transactions if possible.
  • Bringing the data to the most recent and uncorrupted version.

Potential Applications

This technology can be applied in various industries and sectors where data integrity and recoverability are crucial, including:

  • Banking and financial institutions
  • Healthcare and medical records management
  • Government agencies and public sector organizations
  • E-commerce and online platforms
  • Data centers and cloud service providers

Problems Solved

The technology addresses the following problems:

  • Data corruption in enterprise systems
  • Difficulty in detecting and locating the last known uncorrupted data
  • Inability to restore data to the most recent and uncorrupted version
  • Loss of critical information due to corruption

Benefits

The benefits of this technology include:

  • Enhanced data integrity and recoverability
  • Quick detection and location of uncorrupted data
  • Efficient restoration process
  • Minimized data loss and improved data reliability


Original Abstract Submitted

Ensuring that enterprise data that has potentially become corrupted is recoverable and usable by creating safeguarded copy volumes of the enterprise data. One important aspect of any corruption detection scheme is to determine when the data has become corrupted and locate the last known uncorrupted copy of the data as quickly as possible. Once this set of data is identified, the restoration process can begin with that data, and subsequent logged transactions can be reapplied if possible, which brings the data to the most recent and uncorrupted version.