TAG-BASED DATA GOVERNANCE AUDITING SYSTEM

    公开(公告)号:US20230062496A1

    公开(公告)日:2023-03-02

    申请号:US18052990

    申请日:2022-11-07

    Applicant: Snowflake Inc.

    Abstract: A method of implementing object tagging framework starts with the processor receiving a tag creation command including a tag name. In response to the tag creation command, the processor creates a current tag. The processor then receives an association command, the tag name and a source object identifier. The processor determines a source object associated with the source object identifier. The source object includes a tag value. The processor associates the current tag with the source object. The processor receives a replication command including the source object and a target object. The processor causes replication of the source object to the target object that comprises replicating the current tag with the tag name and the tag value in the source object to the target object. Other embodiments are also described herein.

    Row-level security
    43.
    发明授权

    公开(公告)号:US11494513B2

    公开(公告)日:2022-11-08

    申请号:US17661089

    申请日:2022-04-28

    Applicant: Snowflake Inc.

    Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.

    Configuring check constraint and row violation logging using error tables

    公开(公告)号:US12248448B1

    公开(公告)日:2025-03-11

    申请号:US18451522

    申请日:2023-08-17

    Applicant: Snowflake Inc.

    Abstract: Provided herein are systems and methods for configuring integrity constraints (including a check constraint) and row violation logging using error tables. An example method includes decoding a query received at a network-based database system. The query includes a command to perform an operation on a base table. An integrity constraint associated with the base table is retrieved. The integrity constraint specifies a desired configuration for the base table. A verification of the integrity constraint is performed to detect erroneous data of the base table that violates the desired configuration. The erroneous data is input into an error table that is configured as a nested object of the base table. A notification that the erroneous data is available in the error table is generated and output.

    CONFIGURING CHECK CONSTRAINT AND ROW VIOLATION LOGGING USING ERROR TABLES

    公开(公告)号:US20250061099A1

    公开(公告)日:2025-02-20

    申请号:US18451522

    申请日:2023-08-17

    Applicant: Snowflake Inc.

    Abstract: Provided herein are systems and methods for configuring integrity constraints (including a check constraint) and row violation logging using error tables. An example method includes decoding a query received at a network-based database system. The query includes a command to perform an operation on a base table. An integrity constraint associated with the base table is retrieved. The integrity constraint specifies a desired configuration for the base table. A verification of the integrity constraint is performed to detect erroneous data of the base table that violates the desired configuration. The erroneous data is input into an error table that is configured as a nested object of the base table. A notification that the erroneous data is available in the error table is generated and output.

    Column hiding management system
    47.
    发明授权

    公开(公告)号:US12105831B2

    公开(公告)日:2024-10-01

    申请号:US18475403

    申请日:2023-09-27

    Applicant: Snowflake Inc.

    CPC classification number: G06F21/6227 G06F2221/2141

    Abstract: Systems and methods for managing column hiding are provided. The systems and methods receive, from a client device, a query associated with a table. The systems and methods determine an access restriction associated with the client device. The systems and methods identify a column of the table that is restricted by the access restriction associated with the client device. In response to identifying the column of the table that is restricted by the access restriction associated with the client device, the systems and methods provide a result of the query that excludes data corresponding to the column.

    COLUMN HIDING MANAGEMENT SYSTEM
    48.
    发明公开

    公开(公告)号:US20240281555A1

    公开(公告)日:2024-08-22

    申请号:US18475403

    申请日:2023-09-27

    Applicant: Snowflake Inc.

    CPC classification number: G06F21/6227 G06F2221/2141

    Abstract: Systems and methods for managing column hiding are provided. The systems and methods receive, from a client device, a query associated with a table. The systems and methods determine an access restriction associated with the client device. The systems and methods identify a column of the table that is restricted by the access restriction associated with the client device. In response to identifying the column of the table that is restricted by the access restriction associated with the client device, the systems and methods provide a result of the query that excludes data corresponding to the column.

Patent Agency Ranking