최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0728386 (2012-12-27) |
등록번호 | US-9633216 (2017-04-25) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 2 인용 특허 : 254 |
Techniques for providing data retention services based on a geographic region are disclosed. In one aspect, a location of a computing device is determined. A geographic entity corresponding to the location of the computing device is then determined. A data retention policy is applied to production d
Techniques for providing data retention services based on a geographic region are disclosed. In one aspect, a location of a computing device is determined. A geographic entity corresponding to the location of the computing device is then determined. A data retention policy is applied to production data of the computing device based on regulations of the geographic entity. Other aspects are also disclosed.
1. A method of providing data storage services for a first computing device, comprising: determining, with a second computing device, a current location of the first computing device, wherein the first computing device generates application data, andwherein the second computing device is associated
1. A method of providing data storage services for a first computing device, comprising: determining, with a second computing device, a current location of the first computing device, wherein the first computing device generates application data, andwherein the second computing device is associated with providing the data storage services for the first computing device; andwherein the first computing device is a mobile device;determining, with the second computing device, a country or geographic region corresponding to the current location of the first computing device;querying a data structure using the country or geographic region to determine which data storage rules apply to the determined country or geographic region corresponding to the current location of the first computing device, wherein the data storage rules are based on data retention regulations for the determined country or geographic region; andapplying, with the second computing device, a data storage policy to the application data generated by the first computing device, wherein the application data includes production copies of data created at the first computing device,wherein the data storage policy includes creating at least one secondary copy of the application data,wherein the data storage policy is applied based on the data storage rules determined by querying the data structure to apply to the determined country or geographic region corresponding to the current location of the first computing device,wherein the applied data storage policy includes: a frequency with which secondary copies of the production copies of the application data are made,a location to which the secondary copies of the production copies of the application data are stored,a type of secondary copy of the production copies of the application data to be made, andsecurity measures to be applied to at least some of the application data stored on the first computing device. 2. The method of claim 1 wherein the first computing device is portable, wherein determining the location of the first computing device includes:receiving, from the first computing device, one or more of a network address of the first computing device, GPS coordinates of the first computing device, and wireless provider information for the first computing device. 3. The method of claim 1 wherein determining the country includes: querying a database with an IP address of the first computing device; andreceiving an identification of the country from the database in response to the query. 4. The method of claim 1 wherein the country is a first country, wherein the data structure is an access control list that identifies countries into which some classifications of information are prohibited by a government of a second country,wherein adjusting the security measures includes one or more of encrypting, password protecting, and deleting at least part of the application data stored on the computing device, in response to the second computing device determining that the location of the first computing device is within the first country,wherein the method further includes, receiving instructions from a user that identify the at least part of the application data to be deleted, wherein the instructions specify one or more of a file, a folder of files, files having a particular file extension, files containing a particular class of information, and files having a specified level of sensitivity to an organization. 5. The method of claim 1 wherein the country is a first country, wherein the data structure is an access control list that identifies countries into which some classifications of information are prohibited by a government of a second country, wherein adjusting the security measures includes one or more of encrypting, password protecting, and deleting at least part of the application data stored on the computing device, in response to the second computing device determining that the location of the first computing device is within the first country. 6. The method of claim 1 wherein adjusting the security measures includes one or more of encrypting, password protecting, and deleting at least part of the application data stored on the computing device, in response to the second computing device determining that the location of the first computing device is within the country. 7. The method of claim 1 wherein adjusting the security measures includes one or more of encrypting, password protecting, and deleting at least part of the application data stored on the computing device, in response to the second computing device determining that the location of the first computing device is within the country, wherein the method further includes, receiving instructions from a user that identify the at least part of the application data to be deleted, wherein the instructions specify one or more of a file, a folder of files, files having a particular file extension, files containing a particular class of information, and files having a specified level of sensitivity to an organization. 8. The method of claim 1 wherein applying the data storage policy to the application data of the first computing device includes at least two of: creating periodic full backup copies;creating continuous incremental backup copies;creating periodic incremental backup copies;creating intermittent incremental backup copies; andcreating snapshot copies, wherein at least one of the backup or snapshot copies is performed based on the data storage rules,wherein applying the data storage policy to the application data includes varying the frequency of creating backup or snapshot copies. 9. The method of claim 1 wherein applying the data storage policy to the application data of the first computing device includes at least two of: creating periodic full backup copies;creating continuous incremental backup copies;creating periodic incremental backup copies;creating intermittent incremental backup copies; andcreating snapshot copies, wherein at least one of the backup or snapshot copies is performed based on the data storage rules. 10. The method of claim 1 wherein applying the data storage policy includes: determining which one of a number of secondary copy servers is closer to the country than the second computing device;transferring control of secondary copy operations, associated with the first computing device, from the second computing device to the determined one of the number of secondary copy servers that is closer to the country; andcreating secondary copies of the application data of the first computing device with the determined one of the number of secondary copy servers that is closer to the country. 11. The method of claim 1 wherein applying the data storage policy includes: determining which one of a number of secondary copy servers is closer to the country than the second computing device; andcreating secondary copies of the application data of the first computing device with the determined one of the number of secondary copy servers that is closer to the country. 12. The method of claim 1 wherein applying the information management policy includes: determining which one of a number of secondary copy servers is closer to the country than the second computing device; andtransferring secondary copies of the application data for the first computing device from the second computing device to the one of a number of secondary copy servers to decrease the duration of a data restoration operation for the first computing device while the first computing device is located within the country. 13. A non-transitory computer-readable medium having instructions to, if executed by a processor of a computing system, cause the computing system to perform a method of providing data storage services for a first computing device, the method comprising: determining, with a second computing device, a current location of the first computing device, wherein the first computing device generates application data, andwherein the second computing device is associated with providing the data storage services for the first computing device; andwherein the first computing device is a mobile device;determining, with the second computing device, a country or geographic region corresponding to the current location of the first computing device;querying a data structure using the country or geographic region to determine which data storage rules apply to the determined country or geographic region corresponding to the current location of the first computing device, wherein the data storage rules are based on data retention regulations for the determined country or geographic region; andapplying, with the second computing device, a data storage policy to the application data generated by the first computing device, wherein the application data includes production copies of data created at the first computing device,wherein the data storage policy includes creating at least one secondary copy of the application data,wherein the data storage policy is applied based on the data storage rules determined by querying the data structure to apply to the determined country or geographic region corresponding to the current location of the first computing device,wherein the applied data storage policy includes: a frequency with which secondary copies of the production copies of the application data are made,a location to which the secondary copies of the production copies of the application data are stored,a type of secondary copy of the production copies of the application data to be made, andsecurity measures to be applied to at least some of the application data stored on the first computing device. 14. The non-transitory computer-readable medium of claim 13, wherein the first computing device is portable, wherein determining the location of the first computing device includes:receiving, from the first computing device, one or more of a network address of the first computing device, GPS coordinates of the first computing device, and wireless provider information for the first computing device. 15. The non-transitory computer-readable medium of claim 13, wherein determining the country includes: querying a database with an IP address of the first computing device; andreceiving an identification of the country from the database in response to the query. 16. The non-transitory computer-readable medium of claim 13, wherein the country is a first country, wherein the data structure is an access control list that identifies countries into which some classifications of information are prohibited by a government of a second country,wherein adjusting the security measures includes one or more of encrypting, password protecting, and deleting at least part of the application data stored on the computing device, in response to the second computing device determining that the location of the first computing device is within the first country,wherein the method further includes, receiving instructions from a user that identify the at least part of the application data to be deleted, wherein the instructions specify one or more of a file, a folder of files, files having a particular file extension, files containing a particular class of information, and files having a specified level of sensitivity to an organization. 17. The non-transitory computer-readable medium of claim 13, wherein the country is a first country, wherein the data structure is an access control list that identifies countries into which some classifications of information are prohibited by a government of a second country, wherein adjusting the security measures includes one of more of encrypting, password protecting, and deleting at least part of the application data stored on the computing device, in response to the second computing device determining that the location of the first computing device is within the first country. 18. The non-transitory computer-readable medium of claim 13, wherein adjusting the security measures includes one or more of encrypting, password protecting, and deleting at least part of the application data stored on the computing device, in response to the second computing device determining that the location of the first computing device is within the country. 19. The non-transitory computer-readable medium of claim 13, wherein adjusting the security measures includes one or more of encrypting, password protecting, and deleting at least part of the application data stored on the computing device, in response to the second computing device determining that the location of the first computing device is within the country, wherein the method further includes, receiving instructions from a user that identify the at least part of the application data to be deleted, wherein the instructions specify one or more of a file, a folder of files, files having a particular file extension, files containing a particular class of information, and files having a specified level of sensitivity to an organization. 20. The non-transitory computer-readable medium of claim 13, wherein applying the data storage policy to the application data of the first computing device includes at least two of: creating periodic full backup copies;creating continuous incremental backup copies;creating periodic incremental backup copies;creating intermittent incremental backup copies; andcreating snapshot copies, wherein at least one of the backup or snapshot copies is performed based on the data storage rules,wherein applying the data storage policy to the application data includes varying the frequency of creating backup or snapshot copies. 21. The non-transitory computer-readable medium of claim 13, wherein applying the data storage policy to the application data of the first computing device includes at least two of: creating periodic full backup copies;creating continuous incremental backup copies;creating periodic incremental backup copies;creating intermittent incremental backup copies; andcreating snapshot copies, wherein at least one of the backup or snapshot copies is performed based on the data storage rules. 22. The non-transitory computer-readable medium of claim 13, wherein applying the data storage policy includes: determining which one of a number of secondary copy servers is closer to the country than the second computing device;transferring control of secondary copy operations, associated with the first computing device, from the second computing device to the determined one of the number of secondary copy servers that is closer to the country; andcreating secondary copies of the application data of the first computing device with the determined one of the number of secondary copy servers that is closer to the country. 23. The non-transitory computer-readable medium of claim 13, wherein applying the data storage policy includes: determining which one of a number of secondary copy servers is closer to the country than the second computing device; andcreating secondary copies of the application data of the first computing device with the determined one of the number of secondary copy servers that is closer to the country. 24. The non-transitory computer-readable medium of claim 13, wherein applying the information management policy includes: determining which one of a number of secondary copy servers is closer to the country than the second computing device; andtransferring secondary copies of the application data for the first computing device from the second computing device to the one of a number of secondary copy servers to decrease the duration of a data restoration operation for the first computing device while the first computing device is located within the country.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.