Tape failover across a cluster
First Claim
1. A failover security system for a host system with at least two paths to a back up tape storage system, wherein the host system is arranged to enable a single primary path among the paths and detect a failover in the primary path and, in response, send data to the tape system via an alternative path, the security system comprising:
- at least two security appliances each comprising a processor and a memory, with one arranged in the primary path and one in the alternative path between the host and the tape system, wherein the security appliance in the primary path intercepts data transfers between the host and the tape system, and wherein the security appliance encrypts data from the host and stores that encrypted data onto the tape system, and correspondingly, decrypts encrypted data from the tape system and delivers unencrypted data to the host;
a communication channel among or between the at least two security appliances; and
wherein when a tape is initialized by the host, an encryption key is generated in the security appliance in the primary path, and that encryption key is broadcast to the other security appliances via the communication channel.
2 Assignments
0 Petitions
Accused Products
Abstract
A security appliance that encrypts and decrypts information is installed in each of redundant multi-paths between a host system and a back up tape storage system. The host system is arranged to detect failures in a primary path to the tape system being used. When the failure is detected, the host system enables transfers to the same tape system through an alternative path. Encryption keys and host/tape designators (identifiers) are broadcast among the security appliances in the alternative data paths. When the host system switches from the primary path to the secondary path, even though the secondary security appliance did not generate the encryption keys, the secondary path security appliance will have such keys and will properly encrypt and transfer data from the host to the tape system. The secondary will also properly retrieve encrypted data from the tape system, decrypt it and deliver it to the host. All of these operations will be transparent (invisible) to a running application in the host.
48 Citations
23 Claims
-
1. A failover security system for a host system with at least two paths to a back up tape storage system, wherein the host system is arranged to enable a single primary path among the paths and detect a failover in the primary path and, in response, send data to the tape system via an alternative path, the security system comprising:
-
at least two security appliances each comprising a processor and a memory, with one arranged in the primary path and one in the alternative path between the host and the tape system, wherein the security appliance in the primary path intercepts data transfers between the host and the tape system, and wherein the security appliance encrypts data from the host and stores that encrypted data onto the tape system, and correspondingly, decrypts encrypted data from the tape system and delivers unencrypted data to the host; a communication channel among or between the at least two security appliances; and wherein when a tape is initialized by the host, an encryption key is generated in the security appliance in the primary path, and that encryption key is broadcast to the other security appliances via the communication channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method for disabling a primary communication path and enabling a secondary communication path between a host and a tape system, each path having an in-line security appliance interconnected as a cluster, wherein each in-line security appliance comprises a processor and a memory, the method comprising:
-
intercepting data transfers along the primary communication path between the host and the tape system, wherein the in-line security appliance, comprising the processor and the memory, encrypts data from the host and stores that encrypted data onto the tape system, and correspondingly, decrypts encrypted data from the tape system and delivers unencrypted data to the host; initializing a tape in the tape system; generating an encryption key in the security appliance in the primary communication path, and broadcasting the encryption key to the other security appliances over a communication channel between the in-line security appliance and the other security appliances in response to initializing the tape in the tape system and generating the encryption key. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A non-transitory computer readable medium containing executable program instructions executable by a processor, comprising:
-
program instructions that intercept data transfers along a primary path between a host and a tape system, wherein an in-line security appliance, comprising a processor and a memory, encrypts data from the host and stores that encrypted data onto the tape system, and correspondingly, decrypts encrypted data from the tape system and delivers unencrypted data to the host; program instructions that initialize a tape in the tape system; program instructions that generate an encryption key in the security appliance in the primary path; and program instructions that broadcast the encryption key to other security appliances in a cluster over a communication channel between the in-line security appliance and the other security appliances in response to initializing the tape in the tape system and generating the encryption key.
-
Specification