Method and apparatus for verifying data in a storage system
a data and storage system technology, applied in the direction of unauthorized memory use protection, digital storage, instruments, etc., can solve the problems of data suitability loss, data recovery may be difficult to achieve, and the inability to recognize such a loss of data suitability, etc., to achieve the effect of increasing accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
embodiments
[0042]FIG. 1 shows the configuration of a storage system according to an embodiment of the present invention.
[0043] For example, a storage controller 10 shown in this figure is a disk array device and a host computer 20 is a mainframe computer or a personal computer that uses the storage controller 10 as a storage resource. The storage controller 10 is connected to the host computer 20 via a communications means 40. For example, the communications means 40 is a communication line conforming to the SCSI interface standard, a LAN (Local Area Network), or a SAN (Storage Area Network).
[0044] The storage controller 10 may include the following: a CPU 11 for controlling the various parts and functions in the storage controller 10 and executing and controlling various processing programs; a control memory 12 for storing various information; physical devices (not shown), such as disk drives, that serve as “storage devices”; a host interface 13, which may serve as “means for receiving area...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


