SECURING CLOUD COMPUTING ENVIRONMENTS

    公开(公告)号:US20160294850A1

    公开(公告)日:2016-10-06

    申请号:US15185427

    申请日:2016-06-17

    Applicant: SAP SE

    Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.

    Optimal hash calculation of archive files and their file entries

    公开(公告)号:US10528624B2

    公开(公告)日:2020-01-07

    申请号:US14961115

    申请日:2015-12-07

    Applicant: SAP SE

    Inventor: Stoyan Boshev

    Abstract: The present disclosure involves systems, software, and computer implemented methods for calculating hashes of archive files and their file entries. In one example, a method may include receiving an archive file which includes at least one compressed file, storing the archive file by sending a first copy of the archive file stream to a first processing thread which stores the archive file in a local file system, and applying a hash function to the archive file and the at least one compressed file to create hash values corresponding to the archive file and the at least one compressed file by sending a second copy of the archive file stream to a second processing thread, which applies the hash function to the archive file and the at least one compressed file to create the hash values and is executed in parallel to the first processing thread.

    Multilevel disaster recovery
    14.
    发明授权

    公开(公告)号:US10261872B2

    公开(公告)日:2019-04-16

    申请号:US15610609

    申请日:2017-05-31

    Applicant: SAP SE

    Abstract: Account data comprising metadata for primary application instances running at a primary active cloud environment instance (ACEI) is stored. Application data associated with the primary application instances is stored at primary databases (DBs). The account and application data are transferred to secondary DBs at a secondary ACEI. The secondary ACEI may be a backup instance to substitute services provided by the primary ACEI in case of unavailability. For example, the location where the primary ACEI is hosted may be affected by a disaster. To failover a primary data center hosting the primary ACEI, a database takeover to the secondary DBs is performed. The secondary ACEI is configured correspondingly to the primary ACEI based on the transferred account data. Secondary application instances corresponding to the primary application instances are started at the secondary ACEI. Requests directed to the primary application instances are redirected to the secondary application instances.

    Nondeterministic operation execution environment utilizing resource registry

    公开(公告)号:US10067808B2

    公开(公告)日:2018-09-04

    申请号:US14942613

    申请日:2015-11-16

    Applicant: SAP SE

    Abstract: A resource registry provides nondeterministic operation environment affording flexible access for resource execution and status monitoring on the cloud. The resource registry service provides generic resource management utilizing registration, updating, and unregistration by resource providers. A requester for an operation may register in the resource registry, an operation resource having parameters defined in metadata. The resource registry notifies a registered resource listener of this registration of the operation resource. The resource listener may then execute the operation according to parameters defined in the operation resource. The resource listener returns a response to the resource registry, concerning a result of execution of the operation. The resource registry updates this status in the metadata of the operation resource. The requester is then able to look up the operation resource's metadata to determine current status of the operation. The nondeterministic operation environment desirably avoids direct coupling between operation requestor and operation executor APIs.

    CONFIGURING DISASTER RECOVERY FOR A CLOUD BASED APPLICATION

    公开(公告)号:US20180150356A1

    公开(公告)日:2018-05-31

    申请号:US15365816

    申请日:2016-11-30

    Applicant: SAP SE

    CPC classification number: G06F11/203 G06F17/30887 H04L61/1511

    Abstract: In one respect, there is provided a method. The method can include: determining that a second instance of the cloud-based application is deployed at a second cloud platform landscape; replicating, at a second database at the second cloud platform landscape, at least a portion of data from a first database at the first cloud platform landscape, the data from the first database being associated with the first instance of the cloud-based application; and configuring a domain name system (DNS) service to include a primary universal resource locator (URL) for the first instance of the cloud-based application and a secondary URL for the second instance of the cloud-based application, the primary URL and the secondary URL both being associated with a custom domain of the cloud-based application.. Related systems and articles of manufacture are also disclosed.

    Securing cloud computing environments

    公开(公告)号:US09602521B2

    公开(公告)日:2017-03-21

    申请号:US15185427

    申请日:2016-06-17

    Applicant: SAP SE

    Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.

Patent Agency Ranking