×

Method and system for securing network access to dynamically updateable data stored in a data storage system

  • US 7,870,239 B1
  • Filed: 03/29/2002
  • Issued: 01/11/2011
  • Est. Priority Date: 06/30/1998
  • Status: Expired due to Fees
First Claim
Patent Images

1. In a data storage network having a data storage system with memory and one or more data storage devices storing data arranged as one or more data volumes, the one or more data storage devices located at a first location, the data storage system comprising a secure database secured from unauthorized access located at a second location exclusive of the first location, hereinafter denominated as the secure database and wherein the data storage system is in communication with a computer system also having memory, a method for using computer-executable logic for managing secure access to the data by a plurality of hosts, wherein the plurality of host are coupled to the data storage network by an Internet Protocol (IP) network and the data storage system accesses the data via a first path, and wherein the method includes:

  • allocating permissions for controlling accesses to the one or more data volumes stored on the one or more data storage devices;

    in response to each receipt of a connection initiation request by a host of the plurality of hosts over the IP network, copying permissions associated with the hosts from the secure database, wherein being secured from unauthorized access includes being secured from access by the hosts, via a second path to a transient database of the data storage system, wherein the transient database comprises a transient filter table, wherein the transient filter table comprises a record copied from the secure database for each host of the plurality of hosts coupled to each port of a plurality of ports of the storage system, and wherein each of the records stores the permissions for each of the plurality of hosts that accesses the data storage system through the port of the plurality of ports;

    for each request to access a file that is received via the IP network at each port of the plurality of ports of the data storage system, accessing the transient filter table to determine whether the host of the plurality of hosts that initiated the request to access the file has the permission to access the one or more data volumes associated with the file, wherein the transient filter table contains for each host of the plurality of hosts for each port of the plurality of ports, a bitmap identifying the host permissions for each of the one or more data volumes.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×