Browse Prior Art Database

Immediate verification of third party data movement Disclosure Number: IPCOM000030409D
Original Publication Date: 2004-Aug-12
Included in the Prior Art Database: 2004-Aug-12
Document File: 2 page(s) / 11K

Publishing Venue



A method is presented for verification of outboard/third-party data movements, making these kinds of operations more robust.

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 54% of the total text.

Page 1 of 2

Immediate verification of third party data movement

Main Idea of disclosure

1. Problem

With third-party data movers, such as NAS (network-attachted storage) filers or SAN (storage area network) devices gaining popularity for performing the data transfer in backup and restore operations, there has been a need identified to verify that the data mover has in fact copied the correct data, from the correct source, to the correct destination. As the name "third party" implies, data copy appliances such as NDMP-compliant filers or SAN devices implementing the SCSI-3 Extended Copy command are not under the control of the backup /restore system controlling the backup operation. Traditionally the data copied, e.g., during a server-free backup, cannot be verified until the time when the data is restored . This is problematic since the restore most likely needs to take place for the very reason that the original data has been lost or corrupted.

    This publication proposes a method for verifying copy operations involving third party data movement in a scalable manner, right after the copy operation has been performed. E.g., it allows for verification of a server-free backup without requiring the data backed up using server-free data movement to first be restored for manual inspection and verification. Because this method provides immediate verification of third party data transfers it can potentially help build trust in these new and more efficient forms of performing bulk data transfers, such as backup and restore operations.

2. Solution

    The proposed solution to the problem described above involves adding an optional verification step after the operation making use of third party data movement has been performed. The method proposed consists of extending the system controlling this op...