18183625. UNTRUSTED REMOTE REPLICATION PARTNERING simplified abstract (Dell Products L.P.)

From WikiPatents
Jump to navigation Jump to search

UNTRUSTED REMOTE REPLICATION PARTNERING

Organization Name

Dell Products L.P.

Inventor(s)

Lior Benisty of Beer Sheva (IL)

Arieh Don of Newton MA (US)

Efi Levi of Beer Sheva (IL)

UNTRUSTED REMOTE REPLICATION PARTNERING - A simplified explanation of the abstract

This abstract first appeared for US patent application 18183625 titled 'UNTRUSTED REMOTE REPLICATION PARTNERING

Simplified Explanation: The patent application describes a system where different untrusted private computing systems agree to store replicated versions of logical volumes of storage arrays as backups for each other. A management server encrypts a volume to be backed up at a remote computing system and sends the encrypted version to the remote system, ensuring data security and integrity.

  • Management applications for untrusted private computing systems
  • Replicated versions of logical volumes stored as backups
  • Encryption of volumes for secure transmission
  • Remote system unable to modify or delete stored data without configuration-change key
  • Configuration-change key generated by local management server for mirroring modifications

Key Features and Innovation:

  • Secure backup and storage of data between untrusted computing systems
  • Encryption for data security during transmission
  • Configuration-change key for controlling modifications to stored data
  • Reciprocal agreement for mutual backup support
  • Efficient management of storage arrays across different systems

Potential Applications:

  • Data backup and storage solutions for businesses with multiple untrusted computing systems
  • Disaster recovery planning for critical data across remote locations
  • Secure data sharing and collaboration between different private networks
  • Enhanced data protection for sensitive information in cloud computing environments

Problems Solved:

  • Ensures data security and integrity between untrusted computing systems
  • Facilitates efficient backup and recovery processes across remote locations
  • Prevents unauthorized modifications or deletions of stored data
  • Streamlines management of storage arrays for data redundancy and reliability

Benefits:

  • Enhanced data protection and security measures
  • Improved disaster recovery capabilities for critical data
  • Efficient management of storage arrays across different computing systems
  • Secure data sharing and collaboration between private networks

Commercial Applications: The technology can be applied in industries such as finance, healthcare, and government where data security and backup are critical. It can also be used by cloud service providers to offer secure data storage solutions to their clients.

Prior Art: Prior art related to this technology may include patents or research on secure data backup and storage solutions for untrusted computing systems, encryption techniques for data transmission, and management of storage arrays across remote locations.

Frequently Updated Research: Researchers may be exploring advancements in encryption algorithms for secure data transmission, methods for efficient data backup and recovery, and strategies for managing storage arrays in distributed computing environments.

Questions about Data Backup and Storage Solutions: 1. How does the technology ensure data security between untrusted computing systems? 2. What are the potential commercial applications of this secure data backup and storage solution?


Original Abstract Submitted

Different management applications corresponding to different private computing systems that are untrusted with respect to each other reciprocally agree to store for each other replicated versions of logical volumes of storage arrays as backups. A management server corresponding to one or more storage arrays at a local one of the computing systems encrypts a volume to be backed up at the other remote computing system and transmits the encrypted version to the remote computing system. The remote computing system cannot modify or delete a portion of an array that has stored thereon the encrypted version of the logical volume without having a configuration-change key generated by the local management server, which may generate the configuration-change key to facilitate mirroring at the remote storage array a modification made to the local storage array.