17968847. ZERO-TRUST REMOTE REPLICATION simplified abstract (Dell Products L.P.)
Contents
- 1 ZERO-TRUST REMOTE REPLICATION
ZERO-TRUST REMOTE REPLICATION
Organization Name
Inventor(s)
Krishna Deepak Nuthakki of Bangalore (IN)
ZERO-TRUST REMOTE REPLICATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 17968847 titled 'ZERO-TRUST REMOTE REPLICATION
Simplified Explanation
The disaster recovery site storage array innovation involves validating changes to an asynchronously updated replica of a storage object by generating snapshots before and after each set of changes are received from a remote storage array. Validation is performed by mounting snapshots to the host application instance and causing it to validate the data. If a snapshot is invalid, the replica is recovered with the most recent known-valid snapshot.
- Snapshots generated before and after changes
- Validation performed by mounting snapshots to host application instance
- Recovery with most recent known-valid snapshot if invalid
- Decoupling validation from replication by accumulating and validating unvalidated snapshots independently
Potential Applications
This technology can be applied in disaster recovery scenarios, data backup systems, and ensuring data integrity in storage arrays.
Problems Solved
This innovation solves the problem of ensuring data consistency and integrity in disaster recovery scenarios, where changes to a storage object need to be validated before being applied to the replica.
Benefits
The benefits of this technology include improved data reliability, reduced risk of data corruption, and enhanced disaster recovery capabilities.
Potential Commercial Applications
Commercial applications of this technology include data storage solutions, disaster recovery services, and cloud storage providers.
Possible Prior Art
One possible prior art for this technology could be traditional data replication methods that do not involve snapshot validation before applying changes to the replica.
Unanswered Questions
How does this technology compare to traditional data replication methods?
This technology improves upon traditional data replication methods by incorporating snapshot validation before applying changes to the replica, ensuring data integrity and consistency.
What impact does this technology have on data recovery time in disaster scenarios?
This technology can potentially reduce data recovery time in disaster scenarios by quickly identifying and recovering from invalid snapshots, minimizing data loss and downtime.
Original Abstract Submitted
A disaster recovery site storage array causes an instance of a host application or selected executables running on a host server to validate changes to an asynchronously updated replica of a storage object. Snapshots of the replica are generated before and after each set of changes to the replica are received from a remote storage array. Validation is performed by mounting snapshots to the instance of the associated host application and causing the host application instance to validate the data. If a snapshot is determined to be invalid, then the replica to recovered with the most recent known-valid snapshot. Alternatively, if each set of changes is validated prior to being applied to the replica, invalid changes are not applied to the replica. Unvalidated snapshots may be accumulated and validated independently from application of sets of changes to the replica, thereby decoupling validation from replication.