Systems, methods, and computer readable media for computer data protection
First Claim
1. A method of protecting data in a nonvolatile target volume, the method comprising:
- running an operating system (OS) file system in shadow mode in response to an occurrence of an event of interest;
intercepting a write request sent from the OS file system and directed to the nonvolatile target volume, the write request including a data segment and a target location pointer that points to a target volume location;
redirecting the write request to a nonvolatile shadow storage;
writing the data segment in a shadow storage location without ever writing the data segment in the target volume location;
creating a record in a shadow database, the record including the target location pointer and including a shadow location pointer corresponding to the shadow storage location;
intercepting a read request sent from the OS file system and directed to the nonvolatile target volume, the read request including a second target location pointer that points to a second target volume location;
comparing the read request to the shadow database to determine that no record having a target location pointer that matches the second target location pointer is present in the shadow database;
reading a second data segment from the second target volume location;
returning the second data segment to the OS file system without writing the second data segment in the shadow storage; and
in response to switching to running the OS file system in standard mode, discarding the data segment from the shadow storage.
5 Assignments
0 Petitions
Accused Products
Abstract
The present invention comprises computing systems, computer readable media, and methods of protecting computing systems. Embodiments comprise defining a virtual volume, mounting the virtual volume, and processing write accesses. Processing write accesses comprises creating a virtual volume record in a virtual volume database associated with the write access and storing write data at a free location of a shadow cache. Embodiments may also include processing read accesses comprising comparing the read accesses to a virtual volume record to determine if a matching virtual volume record exists, reading data from the target volume if the matching virtual volume record is absent, and reading a data from the shadow cache if the matching virtual volume record is present. Embodiments may also comprise processing at least one virtual volume record upon the occurrence of an event of interest and includes copying a cache data segment from the shadow cache to the target volume.
-
Citations
11 Claims
-
1. A method of protecting data in a nonvolatile target volume, the method comprising:
-
running an operating system (OS) file system in shadow mode in response to an occurrence of an event of interest; intercepting a write request sent from the OS file system and directed to the nonvolatile target volume, the write request including a data segment and a target location pointer that points to a target volume location; redirecting the write request to a nonvolatile shadow storage; writing the data segment in a shadow storage location without ever writing the data segment in the target volume location; creating a record in a shadow database, the record including the target location pointer and including a shadow location pointer corresponding to the shadow storage location; intercepting a read request sent from the OS file system and directed to the nonvolatile target volume, the read request including a second target location pointer that points to a second target volume location; comparing the read request to the shadow database to determine that no record having a target location pointer that matches the second target location pointer is present in the shadow database; reading a second data segment from the second target volume location; returning the second data segment to the OS file system without writing the second data segment in the shadow storage; and in response to switching to running the OS file system in standard mode, discarding the data segment from the shadow storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification