LONG TERM DATA PROTECTION SYSTEM AND METHOD
First Claim
Patent Images
1. A method for accessing a storage system comprising:
- accessing a first read-out partition of a data object, the first read-out partition comprising at least a portion of content comprising the data object;
if content in the first read-out partition is corrupted, then;
accessing the storage system to find a replacement partition from among one or more candidate partitions, including determining if a candidate partition is corrupted or not, the replacement partition being a candidate partition that is not corrupted; and
replacing content in the data object that constitutes the first read-out partition with content of the replacement partition; and
repeating the foregoing with a second read-out partition of the data object.
2 Assignments
0 Petitions
Accused Products
Abstract
A file to be written can be partitioned into one or more partitions. Each such input partition is identified with a hash code and a group ID. Replica(s) of an input partition can be created to ensure a certain number of identical partitions. When a file is accessed, each partition that is read out can be checked for corruption. Corrupted readout partitions are then replaced with a validated replacement partition, whether the replacement partition is from a replica or from another file.
-
Citations
16 Claims
-
1. A method for accessing a storage system comprising:
-
accessing a first read-out partition of a data object, the first read-out partition comprising at least a portion of content comprising the data object;
if content in the first read-out partition is corrupted, then;
accessing the storage system to find a replacement partition from among one or more candidate partitions, including determining if a candidate partition is corrupted or not, the replacement partition being a candidate partition that is not corrupted; and
replacing content in the data object that constitutes the first read-out partition with content of the replacement partition; and
repeating the foregoing with a second read-out partition of the data object. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for accessing data in a storage system comprising:
-
identifying a first data object;
obtaining a first partition of the first data object from the storage system;
performing a computation using data comprising the first data object to produce a first computed value;
obtaining partition identification information relating to the first partition, the partition identification information including a first previously computed value; and
if the first computed value does not match the first previously computed value, then;
obtaining a first candidate partition from the storage system;
performing a computation using data comprising the first candidate partition to produce a second computed value;
obtaining partition identification information relating to the first candidate partition, the partition identification information including a second previously computed value;
if the second computed value does not match the second previously computed value, then repeating with a second candidate partition; and
if the second computed value does match the second previously computed value, then replacing the data comprising the first partition of the first data object with the data comprising the first candidate partition. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A data storage system comprising:
-
a storage subsystem; and
a data processing subsystem in data communication with the storage subsystem to store data to the storage subsystem and to access data stored on the storage subsystem, the data processing subsystem configured to;
access a first file stored on the storage subsystem, wherein the first file comprises data, the data being logically grouped into one or more accessed partitions;
determine, for each accessed partition, whether the accessed partition is corrupt, referred to as a corrupt partition;
determine, for each corrupt partition, whether there is a replacement partition on the storage system, the replacement partition being identical to the accessed partition at a time when the accessed partition was not corrupt; and
modify the first file to replace each of its corrupt partitions with a replacement partition if it exists. - View Dependent Claims (13, 14, 15)
-
-
16. A data processing system comprising:
-
first means for accessing a partition comprising a file that is stored on a storage subsystem, a partition comprising data from the file, a partition having associated therewith a partition ID that uniquely identifies content of the partition, wherein partitions comprising identical content have the same partition ID;
second means for determining whether a partition is corrupt;
third means for identifying a replacement partition from among a plurality of partitions stored on the storage subsystem to replace a corrupt partition, based on a partition ID associated with the corrupt partition and on partition IDs of the plurality of partitions, the corrupt partition being a constituent partition of a target file; and
fourth means to modify the target file to replace content comprising the corrupt partition with content from a replacement partition.
-
Specification