END-TO-END DATA PROTECTION SUPPORTING MULTIPLE CRC ALGORITHMS
First Claim
1. A method for providing end-to-end data protection while supporting multiple cyclic-redundancy-check (CRC) algorithms, the method comprising:
- receiving, from a first host device, a data block protected by a first CRC, the first CRC generated by a first CRC algorithm;
checking the integrity of the data block using the first CRC and the first CRC algorithm;
computing a second CRC for the data block using a second CRC algorithm different from the first CRC algorithm; and
storing the data block, the first CRC, and the second CRC on a storage medium.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for providing end-to-end data protection while supporting multiple cyclic-redundancy-check (CRC) algorithms is disclosed. In one embodiment, such a method includes receiving, from a first host device, a data block protected by a first CRC. The first CRC is generated using a first CRC algorithm. The method checks the integrity of the data block using the first CRC and the first CRC algorithm. The method then computes a second CRC for the data block using a second CRC algorithm different from the first CRC algorithm. The method then stores the data block, the first CRC, and the second CRC on a storage medium, such as magnetic tape.
-
Citations
12 Claims
-
1. A method for providing end-to-end data protection while supporting multiple cyclic-redundancy-check (CRC) algorithms, the method comprising:
-
receiving, from a first host device, a data block protected by a first CRC, the first CRC generated by a first CRC algorithm; checking the integrity of the data block using the first CRC and the first CRC algorithm; computing a second CRC for the data block using a second CRC algorithm different from the first CRC algorithm; and storing the data block, the first CRC, and the second CRC on a storage medium. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification