17968847. ZERO-TRUST REMOTE REPLICATION simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

ZERO-TRUST REMOTE REPLICATION

Organization Name

Dell Products L.P.

Inventor(s)

Yaron Dar of Sudbury MA (US)

Arieh Don of Newton MA (US)

Krishna Deepak Nuthakki of Bangalore (IN)

ZERO-TRUST REMOTE REPLICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17968847 titled 'ZERO-TRUST REMOTE REPLICATION

Simplified Explanation

The disaster recovery site storage array innovation involves validating changes to an asynchronously updated replica of a storage object by generating snapshots before and after each set of changes are received from a remote storage array. Validation is performed by mounting snapshots to the host application instance and causing it to validate the data. If a snapshot is invalid, the replica is recovered with the most recent known-valid snapshot.

  • Snapshots generated before and after changes
  • Validation performed by mounting snapshots to host application instance
  • Recovery with most recent known-valid snapshot if invalid
  • Decoupling validation from replication by accumulating and validating unvalidated snapshots independently

Potential Applications

This technology can be applied in disaster recovery scenarios, data backup systems, and ensuring data integrity in storage arrays.

Problems Solved

This innovation solves the problem of ensuring data consistency and integrity in disaster recovery scenarios, where changes to a storage object need to be validated before being applied to the replica.

Benefits

The benefits of this technology include improved data reliability, reduced risk of data corruption, and enhanced disaster recovery capabilities.

Potential Commercial Applications

Commercial applications of this technology include data storage solutions, disaster recovery services, and cloud storage providers.

Possible Prior Art

One possible prior art for this technology could be traditional data replication methods that do not involve snapshot validation before applying changes to the replica.

Unanswered Questions

How does this technology compare to traditional data replication methods?

This technology improves upon traditional data replication methods by incorporating snapshot validation before applying changes to the replica, ensuring data integrity and consistency.

What impact does this technology have on data recovery time in disaster scenarios?

This technology can potentially reduce data recovery time in disaster scenarios by quickly identifying and recovering from invalid snapshots, minimizing data loss and downtime.


Original Abstract Submitted

A disaster recovery site storage array causes an instance of a host application or selected executables running on a host server to validate changes to an asynchronously updated replica of a storage object. Snapshots of the replica are generated before and after each set of changes to the replica are received from a remote storage array. Validation is performed by mounting snapshots to the instance of the associated host application and causing the host application instance to validate the data. If a snapshot is determined to be invalid, then the replica to recovered with the most recent known-valid snapshot. Alternatively, if each set of changes is validated prior to being applied to the replica, invalid changes are not applied to the replica. Unvalidated snapshots may be accumulated and validated independently from application of sets of changes to the replica, thereby decoupling validation from replication.