-
公开(公告)号:US10084839B2
公开(公告)日:2018-09-25
申请号:US14141489
申请日:2013-12-27
Applicant: SAP SE
Inventor: Stoyan Boshev , Hristo Ilev , Shenol Yousouf , Georgi Gerginov
IPC: G06F15/16 , H04L29/06 , G06F9/54 , H04L29/08 , H04L12/801
CPC classification number: H04L65/602 , G06F9/544 , H04L47/10 , H04L65/608 , H04L65/80 , H04L67/06 , H04L69/14
Abstract: A client system requests to upload an input data stream to a server system. The input data stream is split to a sequence of chunks. The chunks are transferred in parallel by a number of connections from the client system to the server system. At the server system, the transferred chunks are merged into an output stream according to the sequence. The output stream represents the rebuilt input stream.
-
公开(公告)号:US20160294850A1
公开(公告)日:2016-10-06
申请号:US15185427
申请日:2016-06-17
Applicant: SAP SE
Inventor: Hristo Iliev , Stoyan Boshev
CPC classification number: H04L63/1408 , G06F17/30312 , G06F21/62 , H04L63/14 , H04L63/1433 , H04L63/1458
Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.
-
公开(公告)号:US10528624B2
公开(公告)日:2020-01-07
申请号:US14961115
申请日:2015-12-07
Applicant: SAP SE
Inventor: Stoyan Boshev
IPC: G06F16/00 , G06F16/901
Abstract: The present disclosure involves systems, software, and computer implemented methods for calculating hashes of archive files and their file entries. In one example, a method may include receiving an archive file which includes at least one compressed file, storing the archive file by sending a first copy of the archive file stream to a first processing thread which stores the archive file in a local file system, and applying a hash function to the archive file and the at least one compressed file to create hash values corresponding to the archive file and the at least one compressed file by sending a second copy of the archive file stream to a second processing thread, which applies the hash function to the archive file and the at least one compressed file to create the hash values and is executed in parallel to the first processing thread.
-
公开(公告)号:US10261872B2
公开(公告)日:2019-04-16
申请号:US15610609
申请日:2017-05-31
Applicant: SAP SE
Inventor: Stoyan Boshev , Petio Petev , Thomas Walter , Bogdan Vatkov , Hristo Dobtchev , Borislav Arnaudov
Abstract: Account data comprising metadata for primary application instances running at a primary active cloud environment instance (ACEI) is stored. Application data associated with the primary application instances is stored at primary databases (DBs). The account and application data are transferred to secondary DBs at a secondary ACEI. The secondary ACEI may be a backup instance to substitute services provided by the primary ACEI in case of unavailability. For example, the location where the primary ACEI is hosted may be affected by a disaster. To failover a primary data center hosting the primary ACEI, a database takeover to the secondary DBs is performed. The secondary ACEI is configured correspondingly to the primary ACEI based on the transferred account data. Secondary application instances corresponding to the primary application instances are started at the secondary ACEI. Requests directed to the primary application instances are redirected to the secondary application instances.
-
公开(公告)号:US10067808B2
公开(公告)日:2018-09-04
申请号:US14942613
申请日:2015-11-16
Applicant: SAP SE
Inventor: Stoyan Boshev , Chavdar Baikov , Tsvetan Stoyanov , Petio Petev
Abstract: A resource registry provides nondeterministic operation environment affording flexible access for resource execution and status monitoring on the cloud. The resource registry service provides generic resource management utilizing registration, updating, and unregistration by resource providers. A requester for an operation may register in the resource registry, an operation resource having parameters defined in metadata. The resource registry notifies a registered resource listener of this registration of the operation resource. The resource listener may then execute the operation according to parameters defined in the operation resource. The resource listener returns a response to the resource registry, concerning a result of execution of the operation. The resource registry updates this status in the metadata of the operation resource. The requester is then able to look up the operation resource's metadata to determine current status of the operation. The nondeterministic operation environment desirably avoids direct coupling between operation requestor and operation executor APIs.
-
公开(公告)号:US20180150356A1
公开(公告)日:2018-05-31
申请号:US15365816
申请日:2016-11-30
Applicant: SAP SE
Inventor: Stoyan Boshev , Mincho Velev
CPC classification number: G06F11/203 , G06F17/30887 , H04L61/1511
Abstract: In one respect, there is provided a method. The method can include: determining that a second instance of the cloud-based application is deployed at a second cloud platform landscape; replicating, at a second database at the second cloud platform landscape, at least a portion of data from a first database at the first cloud platform landscape, the data from the first database being associated with the first instance of the cloud-based application; and configuring a domain name system (DNS) service to include a primary universal resource locator (URL) for the first instance of the cloud-based application and a secondary URL for the second instance of the cloud-based application, the primary URL and the secondary URL both being associated with a custom domain of the cloud-based application.. Related systems and articles of manufacture are also disclosed.
-
公开(公告)号:US09602521B2
公开(公告)日:2017-03-21
申请号:US15185427
申请日:2016-06-17
Applicant: SAP SE
Inventor: Hristo Iliev , Stoyan Boshev
CPC classification number: H04L63/1408 , G06F17/30312 , G06F21/62 , H04L63/14 , H04L63/1433 , H04L63/1458
Abstract: Some examples of security cloud computing environments can be implemented as methods. A processor of a first computer system that lacks permission to store data in a cloud computing environment receives data to be stored in the cloud computing environment. The data is received from a second computer system implementing the cloud computing environment and having permissions to store data in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system determines that the received data is safe for storage in the cloud computing environment. The processor of the first computer system provides a notification to the second computer system indicating that the received data is safe for storage in the cloud computing environment, and an identifier that points to the stored data at the computer-readable storage medium.
-
-
-
-
-
-