Data Recovery in a Cross Domain Environment
First Claim
1. A method for recovering data when corrupted data from a source is detected, comprising:
- identifying data corrupted as a result of using the corrupted data by tracing propagation of the corrupted data to provide identified corrupted data; and
repairing the identified corrupted data to provide repaired data.
1 Assignment
0 Petitions
Accused Products
Abstract
A method for recovering data when corrupted data from a source is detected includes identifying data corrupted as a result of using the corrupted data by tracing propagation of the corrupted data to provide identified corrupted data, and repairing the identified corrupted data to provide repaired data. The propagation of the corrupted data is traced from one domain to another. Data in both domains is repaired. A wrapper is provided for the source. Calls into and out of the source are intercepted by the wrapper. Calls of a plurality of different domains are intercepted by the wrapper. A wrapper is provided for a process. External service calls of the process are intercepted by the wrapper. The wrapper recreates a process flow followed by the process in accordance with the corrupted data. A wrapper is provided for a database. Accesses of the database are intercepted by the wrapper.
12 Citations
20 Claims
-
1. A method for recovering data when corrupted data from a source is detected, comprising:
-
identifying data corrupted as a result of using the corrupted data by tracing propagation of the corrupted data to provide identified corrupted data; and repairing the identified corrupted data to provide repaired data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification