Dell products l.p. (20240338140). METHOD AND APPARATUS FOR SHARING STORAGE PARTITIONS simplified abstract

From WikiPatents
Revision as of 00:34, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

METHOD AND APPARATUS FOR SHARING STORAGE PARTITIONS

Organization Name

dell products l.p.

Inventor(s)

A Ashok Kumar Reddy of Bangalore (IN)

Sridharan Kuppuswamy of Bangalore (IN)

METHOD AND APPARATUS FOR SHARING STORAGE PARTITIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240338140 titled 'METHOD AND APPARATUS FOR SHARING STORAGE PARTITIONS

The abstract of this patent application describes a method involving an agent executing in a guest operating system that receives a request to mount a storage partition. The agent then determines if the storage partition is in a read-only list. If it is, the storage partition is set as read-only at a block level and mounted as a read-only volume. If not, the storage partition is mounted as a read-write volume and the read-only list is updated.

  • Agent receives a request to mount a storage partition in a guest operating system.
  • Agent checks if the storage partition is in a read-only list.
  • If in the read-only list, set the storage partition as read-only at a block level and mount it as a read-only volume.
  • If not in the read-only list, mount the storage partition as a read-write volume and update the read-only list.

Potential Applications: - Data security and protection in virtual environments. - Managing access control to storage partitions in operating systems.

Problems Solved: - Ensuring data integrity by setting storage partitions as read-only when necessary. - Simplifying the process of managing read-only and read-write storage partitions.

Benefits: - Enhanced data security by preventing accidental modifications to critical storage partitions. - Improved efficiency in managing storage access permissions in virtual environments.

Commercial Applications: Title: Secure Data Management in Virtual Environments This technology can be utilized in cloud computing services, virtual machines, and data centers to enhance data security and streamline storage partition management processes.

Questions about the technology: 1. How does this method improve data security in virtual environments? 2. What are the potential implications of updating the read-only list for storage partitions?


Original Abstract Submitted

a method, comprising: receiving, by an agent that is executing in a first guest operating system, a request to mount a storage partition; detecting, by the agent, whether the storage partition is identified in a read-only list; when the storage partition is identified in the read-only list, setting the storage partition as read-only at a block level, and mounting the storage partition in the first guest operating system as a read-only volume; and when the storage partition is not identified in the read-only list, mounting the storage partition in the first guest operating system as a read-write volume and updating the read-only list to include an identifier of the storage partition.