Techniques for data extraction
    1.
    发明授权

    公开(公告)号:US10133782B2

    公开(公告)日:2018-11-20

    申请号:US15225437

    申请日:2016-08-01

    Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification comprises a source repository identifier that identifies a source repository comprising a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction comprises a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.

    SECURE DEPLOYMENT OF A SOFTWARE PACKAGE
    2.
    发明申请

    公开(公告)号:US20180032706A1

    公开(公告)日:2018-02-01

    申请号:US15697270

    申请日:2017-09-06

    Abstract: Techniques for easy and secure deployment of a software package from a server to a customer-controlled computing device are described. In an embodiment, a deployment engine running on a server can be used to generate a unique URL for deployment of the software package. The unique URL may include a restricted use token. The restricted use token may be generated based on a combination of a random selection of one or more dictionary words, numbers, and/or symbols. The restricted token is easily readable given the combination of dictionary words, numbers, and/or symbols that make up the restricted use token. The unique URL may then be entered into a customer-controlled computing device via a curl command. The curl command will use the unique URL to generate a secure channel to the deployment engine and automatically download the software package onto the customer-controlled computing device. Upon downloading and/or installing the software package on the customer-controlled computing device, the unique URL is invalidated so that it may not be reused.

    TECHNIQUES FOR DATA EXTRACTION
    4.
    发明申请

    公开(公告)号:US20200349152A1

    公开(公告)日:2020-11-05

    申请号:US16933688

    申请日:2020-07-20

    Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification comprises a source repository identifier that identifies a source repository comprising a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction comprises a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.

    Secure deployment of a software package

    公开(公告)号:US11741195B2

    公开(公告)日:2023-08-29

    申请号:US16844855

    申请日:2020-04-09

    Abstract: Techniques for easy and secure deployment of a software package from a server to a customer-controlled computing device are described. In an embodiment, a deployment engine running on a server can be used to generate a unique URL for deployment of the software package. The unique URL may include a restricted use token. The restricted use token may be generated based on a combination of a random selection of one or more dictionary words, numbers, and/or symbols. The restricted token is easily readable given the combination of dictionary words, numbers, and/or symbols that make up the restricted use token. The unique URL may then be entered into a customer-controlled computing device via a curl command. The curl command will use the unique URL to generate a secure channel to the deployment engine and automatically download the software package onto the customer-controlled computing device. Upon downloading and/or installing the software package on the customer-controlled computing device, the unique URL is invalidated so that it may not be reused.

    SECURE DEPLOYMENT OF A SOFTWARE PACKAGE
    9.
    发明申请

    公开(公告)号:US20200233937A1

    公开(公告)日:2020-07-23

    申请号:US16844855

    申请日:2020-04-09

    Abstract: Techniques for easy and secure deployment of a software package from a server to a customer-controlled computing device are described. In an embodiment, a deployment engine running on a server can be used to generate a unique URL for deployment of the software package. The unique URL may include a restricted use token. The restricted use token may be generated based on a combination of a random selection of one or more dictionary words, numbers, and/or symbols. The restricted token is easily readable given the combination of dictionary words, numbers, and/or symbols that make up the restricted use token. The unique URL may then be entered into a customer-controlled computing device via a curl command. The curl command will use the unique URL to generate a secure channel to the deployment engine and automatically download the software package onto the customer-controlled computing device. Upon downloading and/or installing the software package on the customer-controlled computing device, the unique URL is invalidated so that it may not be reused.

    TECHNIQUES FOR DATA EXTRACTION
    10.
    发明申请

    公开(公告)号:US20190034488A1

    公开(公告)日:2019-01-31

    申请号:US16147687

    申请日:2018-09-29

    Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification comprises a source repository identifier that identifies a source repository comprising a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction comprises a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.

Patent Agency Ranking