STORAGE AVAILABILITY USING CRYPTOGRAPHIC SPLITTING
First Claim
1. A method of maintaining data connectivity in a secure data storage network, the method comprising:
- assigning a volume to a primary secure storage appliance located in a secure data storage network the primary secure storage appliance selected from among a plurality of secure storage appliances located in the secure data storage network, the volume presented as a virtual disk to a client device and mapped to physical storage at each of a plurality of storage systems;
detecting at one of the plurality of secure storage appliances a failure of the primary secure storage appliance;
upon detecting the failure of the primary secure storage appliance, reassigning the volume to a second secure storage appliance from among the plurality of secure storage appliances, thereby rendering the second secure storage appliance a new primary secure storage appliance.
7 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for maintaining data connectivity in a secure data storage network are disclosed. In one aspect, a method includes assigning a volume to a primary secure storage appliance located in a secure data storage network the primary secure storage appliance selected from among a plurality of secure storage appliances located in the secure data storage network, the volume presented as a virtual disk to a client device and mapped to physical storage at each of a plurality of storage systems. The method further includes detecting at one of the plurality of secure storage appliances a failure of the primary secure storage appliance. The method also includes, upon detecting the failure of the primary secure storage appliance, reassigning the volume to a second secure storage appliance from among the plurality of secure storage appliances, thereby rendering the second secure storage appliance a new primary secure storage appliance.
63 Citations
21 Claims
-
1. A method of maintaining data connectivity in a secure data storage network, the method comprising:
-
assigning a volume to a primary secure storage appliance located in a secure data storage network the primary secure storage appliance selected from among a plurality of secure storage appliances located in the secure data storage network, the volume presented as a virtual disk to a client device and mapped to physical storage at each of a plurality of storage systems; detecting at one of the plurality of secure storage appliances a failure of the primary secure storage appliance; upon detecting the failure of the primary secure storage appliance, reassigning the volume to a second secure storage appliance from among the plurality of secure storage appliances, thereby rendering the second secure storage appliance a new primary secure storage appliance. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of maintaining operation of a plurality of secure storage appliances, the method comprising:
-
assigning a volume to a primary secure storage appliance located in a secure data storage network the primary secure storage appliance selected from among a plurality of secure storage appliances located in the secure data storage network, the volume presented as a virtual disk to a client device and mapped to physical storage at each of a plurality of storage systems; presenting an administrative interface to an administrator of the secure data storage network, the administrative interface presenting the plurality of secure storage appliances as a virtual secure storage appliance; presenting a common set of administrative settings for each of the plurality of secure storage appliances associated with the virtual secure storage appliance, such that, upon detecting at one of the plurality of secure storage appliances a failure of the primary secure storage appliance, the common set of administrative settings remain accessible to the administrator. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A secure data storage network comprising:
-
a client device; a plurality of storage systems; a plurality of secure storage appliances interconnected between the client device and the plurality of storage systems, the plurality of secure storage appliances including a primary secure storage appliance associated with a volume, the volume presented as a virtual disk to the client device and mapped to physical storage at each of the plurality of storage systems; wherein each of the plurality of secure storage appliances includes a common set of administrative information, and each of the plurality of secure storage appliances monitors operational status of one or more of a different secure storage appliance among the plurality of secure storage appliances. - View Dependent Claims (19, 20, 21)
-
Specification