-
公开(公告)号:US11301419B2
公开(公告)日:2022-04-12
申请号:US15910837
申请日:2018-03-02
Applicant: salesforce.com, inc.
Inventor: Shu Liu , Eric Shahkarami , Yuk Hei Chan , Ming-Yang Chen , Karl Ryszard Skucha , Eli Levine , Ka Chun Au
Abstract: Methods, systems, and devices for data retention handling are described. In some data storage systems, data objects are stored in a non-relational database schema. The system may support configurable data retention policies for different tenants, users, or applications. For example, a data store may receive retention requests, where the retention requests may specify deletion or exportation actions to perform on records contained within data objects. The data store may determine retention rules based on these retention requests, and may periodically or aperiodically evaluate the rules to determine active actions to perform. To improve the efficiency of the system, the data store may aggregate the active actions (e.g., according to the dataset to perform the actions on), and may generate work items corresponding to the aggregate actions. A work processor may retrieve these work items and may efficiently perform the data retention actions on datasets stored in the data object store.
-
公开(公告)号:US20190272335A1
公开(公告)日:2019-09-05
申请号:US15910837
申请日:2018-03-02
Applicant: salesforce.com, inc.
Inventor: Shu Liu , Eric Shahkarami , Yuk Hei Chan , Ming-Yang Chen , Karl Ryszard Skucha , Eli Levine , Ka Chun Au
IPC: G06F17/30
Abstract: Methods, systems, and devices for data retention handling are described. In some data storage systems, data objects are stored in a non-relational database schema. The system may support configurable data retention policies for different tenants, users, or applications. For example, a data store may receive retention requests, where the retention requests may specify deletion or exportation actions to perform on records contained within data objects. The data store may determine retention rules based on these retention requests, and may periodically or aperiodically evaluate the rules to determine active actions to perform. To improve the efficiency of the system, the data store may aggregate the active actions (e.g., according to the dataset to perform the actions on), and may generate work items corresponding to the aggregate actions. A work processor may retrieve these work items and may efficiently perform the data retention actions on datasets stored in the data object store.
-
公开(公告)号:US10853511B2
公开(公告)日:2020-12-01
申请号:US15924840
申请日:2018-03-19
Applicant: salesforce.com, inc.
Inventor: Kit Pang Szeto , Christopher James Wu , Ming-Yang Chen , Karl Ryszard Skucha , Eli Levine , Ka Chun Au , Bilong Chen , Johnson Liu
Abstract: Methods, systems, and devices for data access and processing are described. To set up secure environments for data processing (e.g., including machine learning), an access control system may first receive approval from an authorized user (e.g., an approver) granting access to data objects in a multi-tenant data store. The system may determine tenant-specific paths for retrieving the data objects from the data store, and may initialize a number of virtual computing engines for accessing the data. Each computing engine may be tenant-specific based on the path(s) used by that computing engine, and each may include an access role defining the data objects or data object types accessible by that computing engine. By accessing the requested data objects according to the tenant-specific path prefixes and access roles, the virtual computing engines may securely maintain separate environments for different tenants and may only allow user access to approved tenant data.
-
公开(公告)号:US20190286832A1
公开(公告)日:2019-09-19
申请号:US15924840
申请日:2018-03-19
Applicant: salesforce.com, inc.
Inventor: Kit Pang Szeto , Christopher James Wu , Ming-Yang Chen , Karl Ryszard Skucha , Eli Levine , Ka Chun Au , Bilong Chen , Johnson Liu
Abstract: Methods, systems, and devices for data access and processing are described. To set up secure environments for data processing (e.g., including machine learning), an access control system may first receive approval from an authorized user (e.g., an approver) granting access to data objects in a multi-tenant data store. The system may determine tenant-specific paths for retrieving the data objects from the data store, and may initialize a number of virtual computing engines for accessing the data. Each computing engine may be tenant-specific based on the path(s) used by that computing engine, and each may include an access role defining the data objects or data object types accessible by that computing engine. By accessing the requested data objects according to the tenant-specific path prefixes and access roles, the virtual computing engines may securely maintain separate environments for different tenants and may only allow user access to approved tenant data.
-
-
-