Data virtualization using copy data tokens
First Claim
1. A computerized method for using a data token to automatically manage access to copy data associated with the data token, the data token defining attributes for the copy data associated with the data token to facilitate the automatic management of the copy data, the computerized method comprising:
- storing, by a computing device with a processor and memory, the data token that defines attributes associated with copy data, wherein the copy data comprises both a full copy of data at a data source and one or more incremental changes to the data at the data source over time, the attributes comprising;
source data for the copy data indicative of the data source for the copy data;
transformation data for the copy data indicative of a set of modifications for the copy data specifying how the copy data is modified when creating an instance of the copy data; and
access data for the copy data indicative of;
a set of access settings for the copy data that define how an instance of the copy data is to be created for the user; and
a set of access permissions for the copy data that define an access level for the user for the copy data that defines how much of the copy data the user can access;
transmitting, by the computing device, the data token to a remote computer storing the copy data based on the source data in the data token; and
receiving, by the computing device, a customized copy of the copy data that the remote computer generated for the user from the copy data, the customized copy including modifications to the copy data based on the transformation data and the access data in the data token, thereby using the data token to automatically manage access to copy data associated with the data token for the user.
8 Assignments
0 Petitions
Accused Products
Abstract
Computerized systems and methods are provided for data virtualization using copy data tokens. A data token is stored that defines attributes associated with copy data, including source data, transformation data, and access data for the copy data. The access data is indicative of a set of access settings for the copy data that define how an instance of the copy data is to be created for the user, and a set of access permissions for the copy data that define an access level for the user for the copy data that defines how much of the copy data the user can access. The data token is transmitted to a remote computer storing the copy data based on the source data in the data token. A copy of the copy data that was generated based on the preparation information and the access data is received.
112 Citations
18 Claims
-
1. A computerized method for using a data token to automatically manage access to copy data associated with the data token, the data token defining attributes for the copy data associated with the data token to facilitate the automatic management of the copy data, the computerized method comprising:
-
storing, by a computing device with a processor and memory, the data token that defines attributes associated with copy data, wherein the copy data comprises both a full copy of data at a data source and one or more incremental changes to the data at the data source over time, the attributes comprising; source data for the copy data indicative of the data source for the copy data; transformation data for the copy data indicative of a set of modifications for the copy data specifying how the copy data is modified when creating an instance of the copy data; and access data for the copy data indicative of; a set of access settings for the copy data that define how an instance of the copy data is to be created for the user; and a set of access permissions for the copy data that define an access level for the user for the copy data that defines how much of the copy data the user can access; transmitting, by the computing device, the data token to a remote computer storing the copy data based on the source data in the data token; and receiving, by the computing device, a customized copy of the copy data that the remote computer generated for the user from the copy data, the customized copy including modifications to the copy data based on the transformation data and the access data in the data token, thereby using the data token to automatically manage access to copy data associated with the data token for the user. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computerized apparatus for using a data token to automatically manage access to copy data associated with the data token, the data token defining attributes for the copy data associated with the data token to facilitate the automatic management of the copy data, the apparatus comprising:
a processor configured to run a module stored in memory that is configured to cause the processor to; store the data token that defines attributes associated with copy data, wherein the copy data comprises both a full copy of data at a data source and one or more incremental changes to the data at the data source over time, the attributes comprising; source data for the copy data indicative of the data source for the copy data; transformation data for the copy data indicative of a set of modifications for the copy data specifying how the copy data is modified when creating an instance of the copy data; and access data for the copy data indicative of; a set of access settings for the copy data that define how an instance of the copy data is to be created for the user; and a set of access permissions for the copy data that define an access level for the user for the copy data that defines how much of the copy data the user can access; transmit the data token to a remote computer storing the copy data based on the source data in the data token; and receive a customized copy of the copy data that the remote computer generated for the user from the copy data, the customized copy including modifications to the copy data based on the transformation data and the access data in the data token, thereby using the data token to automatically manage access to copy data associated with the data token for the user. - View Dependent Claims (8, 9, 10, 11, 12)
-
13. A non-transitory computer readable medium having executable instructions operable to cause an apparatus to:
-
store a data token that defines attributes associated with copy data, wherein the copy data comprises both a full copy of data at a data source and one or more incremental changes to the data at the data source over time, the attributes comprising; source data for the copy data indicative of the data source for the copy data; transformation data for the copy data indicative of a set of modifications for the copy data specifying how the copy data is modified when creating an instance of the copy data; and access data for the copy data indicative of; a set of access settings for the copy data that define how an instance of the copy data is to be created for the user; and a set of access permissions for the copy data that define an access level for the user for the copy data that defines how much of the copy data the user can access; transmit the data token to a remote computer storing the copy data based on the source data in the data token; and receive a customized copy of the copy data that the remote computer generated for the user from the copy data, the customized copy including modifications to the copy data based on the transformation data and the access data in the data token, thereby using the data token to automatically manage access to copy data associated with the data token for the user. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification