×

Method and apparatus for enhanced computer security

  • US 9,021,224 B2
  • Filed: 06/30/2011
  • Issued: 04/28/2015
  • Est. Priority Date: 06/30/2011
  • Status: Active Grant
First Claim
Patent Images

1. A computer system, comprising:

  • a first storage apparatus which provides a first logical volume from/to which a host apparatus reads and writes data; and

    a second storage apparatus that includes an external connection function which provides a second logical volume obtained by virtualizing the first logical volume of the first storage apparatus, to the host apparatus and provides a third logical volume, wherein the second storage apparatus is configured to copy data from the second logical volume to the third logical volume as receiving an access request to the second logical volume,the first logical volume being reserved when the host apparatus accesses the first logical volume,wherein the second storage apparatus;

    receives a first registration-target key from the host apparatus, transmits, to the first storage apparatus, a first command containing the first registration-target key, and first path information, which relates to a path from the host apparatus to the second logical volume, in response to a key registration request from the host apparatus to the effect that a key is to be registered for the second logical volume,receives a reservation request that includes a second key from the host apparatus,transmits, to the first storage apparatus, a second command containing the second key, and second path information to reserve the second logical volume, which relates to a path from the host apparatus to the second logical volume, in response to the reservation request from the host apparatus to the effect that the second logical volume is to be reserved, andtransmits, from the second storage apparatus to the first storage apparatus, a third command containing third path information, which relates to a path from the host apparatus to the second logical volume, in response to an access request for access to the second logical volume from the host apparatus, and wherein the first storage apparatus;

    upon receiving the first command, stores the first key and the first path information contained in the first command as reservation information in association with the first key registration-target logical volume,upon receiving the second command, compares the first key and the first path information, which are contained in reservation information stored in association with the first logical volume which is a reservation target, with the second key and the second path information which are contained in the second command and, when there is a match between the first key and the first path information and the second key and the second path information, reserves the first logical volume for use by the host apparatus, and,upon receiving the third command, compares the first path information, which is contained in the reservation information stored in association with the first logical volume which is an access target, with the third path information which is contained in the third command and, when there is a match between the first and third path information, access from the host apparatus is granted via the second storage apparatus,wherein the second storage apparatus is configured to transmit a fourth command that corresponds to the reservation cancellation request to the first storage apparatus in response to a mapping cancellation request,upon receiving the fourth command, the first storage apparatus is configured to transmit the corresponding reservation information stored for the corresponding first logical volume to the second logical volume,wherein the second storage apparatus is configured to rewrite the reservation information transmitted by the first storage apparatus, andwherein the second storage apparatus is configured to process the access restrictions using the rewritten reservation information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×