US 12,105,604 B1
Method and system for data protection and data availability
Parminder Singh Sethi, Ludhiana (IN); and Anay Kishore, Bangalore (IN)
Assigned to DELL PRODUCTS L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Mar. 28, 2023, as Appl. No. 18/191,576.
Int. Cl. G06F 11/20 (2006.01); H04L 9/40 (2022.01)
CPC G06F 11/2007 (2013.01) [H04L 63/0428 (2013.01); G06F 2201/875 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing data availability, the method comprising:
making a first determination by a first security module (FSM) that a first storage area network (SAN) infrastructure in a first data center has experienced a failure;
obtaining, by the FSM in response to the first determination, coordinated universal time (UTC)-based system time of the first SAN infrastructure;
generating, by the FSM, a secure string based on the coordinated UTC-based system time and a configuration parameter set by a user of the first SAN infrastructure;
encrypting, by the FSM, the secure string to generate an encrypted secure string;
appending, by the FSM, the encrypted secure string to a SAN failure notification to generate an encrypted secure string-appended request;
sending, by the FSM, the encrypted secure string-appended request to a second data center, wherein the second data center is selected based on a second configuration parameter;
making a second determination after intercepting the encrypted secure string-appended request and by a second security module (SSM) that the encrypted secure string-appended request is valid;
initiating, by the SSM, a secure data path from the first data center to the second data center and
initiating, based on the second determination and by the SSM, a data continuity operation, wherein the data continuity operation comprises:
receiving a request from a client device at the first data center;
sending the request from the first data center to the second data center;
processing the request using, in part, the second data center to obtain a processed request;
sending the processed request to the first data center; and
sending the processed request from the first data center to the client device.