Secure data transfer platform for hybrid computing environment
First Claim
Patent Images
1. A method comprising:
- providing a data transfer profile specifying a source, and a destination, the source being in a first network domain of an enterprise, and the destination being in a cloud domain of a cloud services provider;
processing the data transfer profile to generate a plurality of rules;
distributing a first rule of the plurality of rules to the source, the first rule comprising an identification of a folder at the source;
receiving, in response to an evaluation of the first rule at the source, a plurality of files stored in the folder at the source; and
transmitting the plurality of files to a cache server in the cloud domain for the cache server to distribute the plurality of files to the destination in the cloud domain of the cloud services provider.
1 Assignment
0 Petitions
Accused Products
Abstract
A data transfer profile defines the transfer of data among different domains. The data transfer profile is processed to generate data transfer rules. Subsets of the rules are distributed to the different domains. A rule can specify a folder in a particular domain in which files stored in the folder will be transferred to another domain.
-
Citations
7 Claims
-
1. A method comprising:
-
providing a data transfer profile specifying a source, and a destination, the source being in a first network domain of an enterprise, and the destination being in a cloud domain of a cloud services provider; processing the data transfer profile to generate a plurality of rules; distributing a first rule of the plurality of rules to the source, the first rule comprising an identification of a folder at the source; receiving, in response to an evaluation of the first rule at the source, a plurality of files stored in the folder at the source; and transmitting the plurality of files to a cache server in the cloud domain for the cache server to distribute the plurality of files to the destination in the cloud domain of the cloud services provider.
-
-
2. The method of claim 1 comprising:
distributing a second rule of the plurality of rules to the cache server, the second rule comprising an identification of the destination.
-
3. The method of claim 1 wherein the destination comprises a virtual machine, and the method comprises:
-
distributing a second rule of the plurality of rules to the virtual machine, the second rule comprising an identification of a folder at the virtual machine; receiving, in response to an evaluation of the second rule at the virtual machine, a second plurality of files stored in the folder at the virtual machine from the cache server; and transmitting the second plurality of files to a backup.
-
-
4. The method of claim 3 wherein the backup comprises a cloud storage server in the cloud domain.
-
5. The method of claim 3 wherein the backup comprises a backup server in the first network domain of the enterprise.
-
6. The method of claim 3 wherein the backup comprises a backup server in a second network domain of the enterprise, different from the first network domain.
-
7. The method of claim 1 comprising:
storing a security key at a location outside of the cloud domain for encrypting files transmitted to the destination in the cloud domain.
Specification