ROW-LEVEL SECURITY
    31.
    发明申请

    公开(公告)号:US20220253547A1

    公开(公告)日:2022-08-11

    申请号:US17661089

    申请日:2022-04-28

    Applicant: Snowflake Inc.

    Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.

    System for implementing an object tagging framework

    公开(公告)号:US11301478B1

    公开(公告)日:2022-04-12

    申请号:US17160960

    申请日:2021-01-28

    Applicant: Snowflake Inc.

    Abstract: A method of implementing object tagging framework starts with the processor receiving a tag creation command including a tag name. In response to the tag creation command, the processor creates a current tag. The processor then receives an association command, the tag name and a source object identifier. The processor determines a source object associated with the source object identifier. The source object includes a tag value. The processor associates the current tag with the source object. The processor receives a replication command including the source object and a target object. The processor causes replication of the source object to the target object that comprises replicating the current tag with the tag name and the tag value in the source object to the target object. Other embodiments are also described herein.

    Shared tag data system
    33.
    发明授权

    公开(公告)号:US12222949B2

    公开(公告)日:2025-02-11

    申请号:US18545672

    申请日:2023-12-19

    Applicant: Snowflake Inc.

    Abstract: A method of implementing object tagging framework starts with the processor receiving a tag creation command including a tag name. In response to the tag creation command, the processor creates a current tag. The processor then receives an association command, the tag name and a source object identifier. The processor determines a source object associated with the source object identifier. The source object includes a tag value. The processor associates the current tag with the source object. The processor receives a replication command including the source object and a target object. The processor causes replication of the source object to the target object that comprises replicating the current tag with the tag name and the tag value in the source object to the target object. Other embodiments are also described herein.

    Row-level security
    34.
    发明授权

    公开(公告)号:US12135815B2

    公开(公告)日:2024-11-05

    申请号:US18521589

    申请日:2023-11-28

    Applicant: Snowflake Inc.

    Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.

    TAG-BASED DATA GOVERNANCE AUDITING SYSTEM

    公开(公告)号:US20230062496A1

    公开(公告)日:2023-03-02

    申请号:US18052990

    申请日:2022-11-07

    Applicant: Snowflake Inc.

    Abstract: A method of implementing object tagging framework starts with the processor receiving a tag creation command including a tag name. In response to the tag creation command, the processor creates a current tag. The processor then receives an association command, the tag name and a source object identifier. The processor determines a source object associated with the source object identifier. The source object includes a tag value. The processor associates the current tag with the source object. The processor receives a replication command including the source object and a target object. The processor causes replication of the source object to the target object that comprises replicating the current tag with the tag name and the tag value in the source object to the target object. Other embodiments are also described herein.

Patent Agency Ranking