APPROACHES FOR MANAGING ACCESS CONTROL PERMISSIONS

    公开(公告)号:US20210124766A1

    公开(公告)日:2021-04-29

    申请号:US17077792

    申请日:2020-10-22

    Abstract: Systems and methods are provided for determining a query involving at least one dataset comprising a plurality of records, the query being submitted by a first user operating a computing device. An archetype policy that governs access to records of the at least one dataset can be determined, wherein the archetype policy includes at least one logical formula to be evaluated when determining whether a requesting user is permitted to access a given record, and wherein the at least one logical formula is satisfied based at least in part on a state associated with the requesting user and at least one first variable evaluated by the at least one logical formula. At least one record that the first user is permitted to access can be determined based at least in part on satisfaction of the at least one logical formula associated with the archetype policy.

    SYSTEMS AND METHODS FOR CONSISTENT BACKUP OF DISTRIBUTED, TRANSACTIONAL DATABASES

    公开(公告)号:US20210064475A1

    公开(公告)日:2021-03-04

    申请号:US17006109

    申请日:2020-08-28

    Inventor: James Baker

    Abstract: A distributed, transactional database uses timestamps, such as logical clock values, for entry versioning and transaction management in the database. To write to the database, a service requests a timestamp to be inserted into the database with a new version of data. During a backup procedure, a cleanup process is paused, issuing new timestamps is paused, and a backup timestamp is generated, which results in an effective backup copy. Such steps approximate turning off all of the database servers and backing up the servers due to the external devices and services being unable to write new data for a period of time and having the cleanup turned off for a period of time. A snapshot of the database can have some inconsistent entries. During a restore of a backup, a snapshot of the database is loaded and any entries older than the backup timestamp are deleted, which ensures that a consistent restore has occurred. Uploads of backup copies can be expedited by only uploading incremental changes and keeping track of data that is associated with multiple backup copy versions.

    DATA STORAGE METHOD AND SYSTEM
    24.
    发明申请

    公开(公告)号:US20200073859A1

    公开(公告)日:2020-03-05

    申请号:US16249740

    申请日:2019-01-16

    Abstract: Example embodiments describe a data storage method and system. For example, the method described, performed by one or more processors, may comprise in an application for enforcing one or more policies for reading and writing data to a database receiving, over a data network, instructions for performing a read or write request for data, and sending the read or write request to a transaction manager for providing transactions for a key-value store of the database, the request being in accordance with one or more policies to be enforced by the enforcing application. The method may also comprise receiving, from the transaction manager, a response message based on operations performed by the transaction manager in response to the read or write request.

    Data structure based on event compaction and read-offsets

    公开(公告)号:US12118013B2

    公开(公告)日:2024-10-15

    申请号:US18473562

    申请日:2023-09-25

    CPC classification number: G06F16/254 G06F16/2358 G06F16/2457

    Abstract: Disclosed herein are systems and computer-implemented methods that include storing a sequence of events, each event associated with a sequence number indicating a temporal position of an event within the sequence of events; further storing one or more read-offsets that are associated with respective consumers and that indicate the sequence number up to which the respective consumers have read events within the sequence of events; determining a smallest read-offset of all read-offsets; compacting events and/or earlier snapshots with sequence numbers smaller than the smallest read-offset into a new snapshot; and replacing, in the sequence of events, the events and/or earlier snapshots with sequence numbers smaller than the smallest read-offset with the new snapshot.

    Systems and methods for providing network-based permissioning using security node hash identifiers

    公开(公告)号:US11263336B2

    公开(公告)日:2022-03-01

    申请号:US16733415

    申请日:2020-01-03

    Abstract: Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.

Patent Agency Ranking