US 12,450,000 B2
System and method for determining the security status of a source device based on the security requirement of the destination device
Parminder Singh Sethi, Ludhiana (IN); and Atishay Jain, Meerut (IN)
Assigned to DELL PRODUCTS L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Feb. 23, 2023, as Appl. No. 18/173,256.
Prior Publication US 2024/0289044 A1, Aug. 29, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 3/06 (2006.01); G06F 21/10 (2013.01); G06F 21/62 (2013.01)
CPC G06F 3/0647 (2013.01) [G06F 3/0604 (2013.01); G06F 3/0683 (2013.01); G06F 21/101 (2023.08); G06F 21/6209 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for managing data migration, the method comprising:
receiving, by a target storage device and from a source storage device, a migration request for migration of application data, wherein the migration is associated with transmitting the application data from the source storage device to the target storage device, and wherein the source storage device issues the migration request based on an imminent failure of the source storage device;
in response to the migration request:
sending, by the target storage device, a security remote security script to the source storage device;
obtaining, by the target storage device, a response based on execution of the security remote security script on the source storage device;
performing, by the target storage device, a security classification on the source storage device based on the response to obtain a security tag for the source storage device;
determining, by the target storage device, a migration strategy for the migration of the application data from the source storage device based on the security tag and based on a timeline of the imminent failure, wherein the migration strategy indicates a level of encryption and a level of compression for the migration, and wherein the level of encryption correlates inversely to a level of the security tag, and wherein the level of compression correlates inversely to the timeline of the imminent failure; and
implementing the migration strategy to migrate the application data from the source storage device to the target storage device by applying the level of encryption and the level of compression to the application data prior to transmitting the data to the target storage device.