Dell products l.p. (20240134985). ZERO-TRUST REMOTE REPLICATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

ZERO-TRUST REMOTE REPLICATION

Organization Name

dell products l.p.

Inventor(s)

Yaron Dar of Sudbury MA (US)

Arieh Don of Newton MA (US)

Krishna Deepak Nuthakki of Bangalore (IN)

ZERO-TRUST REMOTE REPLICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240134985 titled 'ZERO-TRUST REMOTE REPLICATION

Simplified Explanation

The patent application describes a method for validating changes to a storage object replica using snapshots before and after each set of changes, allowing for independent validation from replication.

  • Snapshots are generated before and after changes to the storage object replica.
  • The snapshots are mounted to the host application instance for validation.
  • If a snapshot is invalid, the replica is recovered with the most recent valid snapshot.
  • Unvalidated snapshots can be accumulated and validated independently from applying changes to the replica.

Potential Applications

This technology can be applied in disaster recovery scenarios, data backup systems, and storage array management.

Problems Solved

1. Ensures data integrity by validating changes to storage object replicas. 2. Allows for quick recovery in case of invalid data changes.

Benefits

1. Increased data reliability and integrity. 2. Efficient disaster recovery processes. 3. Simplified management of storage arrays.

Potential Commercial Applications

Optimizing disaster recovery solutions for businesses.

Possible Prior Art

Prior art may include similar methods for validating changes to storage objects in disaster recovery systems.

Unanswered Questions

How does this technology impact data security in storage arrays?

This technology enhances data security by ensuring the validity of changes made to storage object replicas, reducing the risk of data corruption or loss.

What are the potential scalability limitations of this method in large storage arrays?

The scalability of this method in large storage arrays may depend on the efficiency of snapshot generation and validation processes, as well as the capacity of the host application to handle multiple snapshots simultaneously.


Original Abstract Submitted

a disaster recovery site storage array causes an instance of a host application or selected executables running on a host server to validate changes to an asynchronously updated replica of a storage object. snapshots of the replica are generated before and after each set of changes to the replica are received from a remote storage array. validation is performed by mounting snapshots to the instance of the associated host application and causing the host application instance to validate the data. if a snapshot is determined to be invalid, then the replica to recovered with the most recent known-valid snapshot. alternatively, if each set of changes is validated prior to being applied to the replica, invalid changes are not applied to the replica. unvalidated snapshots may be accumulated and validated independently from application of sets of changes to the replica, thereby decoupling validation from replication.