Securely moving data across boundaries

Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Winter, Daniel Keith, Gopal, Burra, Narayan, Shyam, Oliver, David Charles, Fanaru, Adrian, Rupke, James, Manek, Parul
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Winter, Daniel Keith
Gopal, Burra
Narayan, Shyam
Oliver, David Charles
Fanaru, Adrian
Rupke, James
Manek, Parul
description Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10261943B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10261943B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10261943B23</originalsourceid><addsrcrecordid>eNrjZFALTk0uLUrNqVTIzS_LzEtXSEksSVRITC7KLy5WSMovzUtJLMpMLeZhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYYGRmaGlibGTkbGxKgBAId7J-I</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Securely moving data across boundaries</title><source>esp@cenet</source><creator>Winter, Daniel Keith ; Gopal, Burra ; Narayan, Shyam ; Oliver, David Charles ; Fanaru, Adrian ; Rupke, James ; Manek, Parul</creator><creatorcontrib>Winter, Daniel Keith ; Gopal, Burra ; Narayan, Shyam ; Oliver, David Charles ; Fanaru, Adrian ; Rupke, James ; Manek, Parul</creatorcontrib><description>Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190416&amp;DB=EPODOC&amp;CC=US&amp;NR=10261943B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,777,882,25545,76296</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20190416&amp;DB=EPODOC&amp;CC=US&amp;NR=10261943B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Winter, Daniel Keith</creatorcontrib><creatorcontrib>Gopal, Burra</creatorcontrib><creatorcontrib>Narayan, Shyam</creatorcontrib><creatorcontrib>Oliver, David Charles</creatorcontrib><creatorcontrib>Fanaru, Adrian</creatorcontrib><creatorcontrib>Rupke, James</creatorcontrib><creatorcontrib>Manek, Parul</creatorcontrib><title>Securely moving data across boundaries</title><description>Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZFALTk0uLUrNqVTIzS_LzEtXSEksSVRITC7KLy5WSMovzUtJLMpMLeZhYE1LzClO5YXS3AyKbq4hzh66qQX58anFBYnJqXmpJfGhwYYGRmaGlibGTkbGxKgBAId7J-I</recordid><startdate>20190416</startdate><enddate>20190416</enddate><creator>Winter, Daniel Keith</creator><creator>Gopal, Burra</creator><creator>Narayan, Shyam</creator><creator>Oliver, David Charles</creator><creator>Fanaru, Adrian</creator><creator>Rupke, James</creator><creator>Manek, Parul</creator><scope>EVB</scope></search><sort><creationdate>20190416</creationdate><title>Securely moving data across boundaries</title><author>Winter, Daniel Keith ; Gopal, Burra ; Narayan, Shyam ; Oliver, David Charles ; Fanaru, Adrian ; Rupke, James ; Manek, Parul</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10261943B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Winter, Daniel Keith</creatorcontrib><creatorcontrib>Gopal, Burra</creatorcontrib><creatorcontrib>Narayan, Shyam</creatorcontrib><creatorcontrib>Oliver, David Charles</creatorcontrib><creatorcontrib>Fanaru, Adrian</creatorcontrib><creatorcontrib>Rupke, James</creatorcontrib><creatorcontrib>Manek, Parul</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Winter, Daniel Keith</au><au>Gopal, Burra</au><au>Narayan, Shyam</au><au>Oliver, David Charles</au><au>Fanaru, Adrian</au><au>Rupke, James</au><au>Manek, Parul</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Securely moving data across boundaries</title><date>2019-04-16</date><risdate>2019</risdate><abstract>Data to be moved from a source system to a target system, for a set of tenants, is first identified. The data is enumerated by a first computing instance in the source system to obtain an enumeration list. Data is copied from the source system to the target system based on the enumeration list by a second computing instance. The data in the source and target systems is then enumerated by a third computing instance to determine whether any data is still to be moved and another enumeration list is generated. The data still to be moved is then moved based on the other enumeration list.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US10261943B2
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title Securely moving data across boundaries
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T10%3A45%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Winter,%20Daniel%20Keith&rft.date=2019-04-16&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10261943B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true