US 12,271,274 B2
Application-centric cyber recovery
Ofir Ezrielev, Beer Sheva (IL); Jehuda Shemer, Kfar Saba (IL); and Amihai Savir, Newton, MA (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Oct. 4, 2022, as Appl. No. 17/937,949.
Prior Publication US 2024/0111635 A1, Apr. 4, 2024
Int. Cl. G06F 16/00 (2019.01); G06F 11/14 (2006.01)
CPC G06F 11/1469 (2013.01) [G06F 11/1456 (2013.01); G06F 2201/84 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method, comprising:
listening, by a storage vault that is an element of a computing system, to a port that is specific to a particular data structure in the storage vault;
determining, by the storage vault, that an air gap between the storage vault and an entity external to the storage vault, is closed, such that communication between the storage vault and the external entity, by way of the port, is enabled, and wherein when the air gap is closed, the port enables communication only between the external entity and the particular data structure of the storage vault, and no other data structures of the storage vault are accessible by way of the port when the air gap is closed;
signaling, by the storage vault to the external entity, that the air gap is closed; and
receiving, at the storage vault by way of the port, data from the external entity.