-
公开(公告)号:US20230273905A1
公开(公告)日:2023-08-31
申请号:US18068998
申请日:2022-12-20
Applicant: Snowflake Inc.
Inventor: Damien Carru , Benoit Dageville , Subramanian Muralidhar , Eric Robinson , Sahaj Saini , David Schultz
CPC classification number: G06F16/212 , G06F16/285 , G06F21/6245
Abstract: Techniques for creating, sharing, and using bundles (also referred to as packages) in a multi-tenant database are described herein. A bundle is a schema object with associated hidden schemas. A bundle can be created by a provider user and can be shared with a plurality of consumer users. The bundle can be used to enable code sharing and distribution without losing control while maintaining security protocols.
-
公开(公告)号:US20230062496A1
公开(公告)日:2023-03-02
申请号:US18052990
申请日:2022-11-07
Applicant: Snowflake Inc.
Inventor: Artin Avanes , Khalid Zaman Bijon , Yujie Li , Zheng Mi , Subramanian Muralidhar , David Schultz
Abstract: A method of implementing object tagging framework starts with the processor receiving a tag creation command including a tag name. In response to the tag creation command, the processor creates a current tag. The processor then receives an association command, the tag name and a source object identifier. The processor determines a source object associated with the source object identifier. The source object includes a tag value. The processor associates the current tag with the source object. The processor receives a replication command including the source object and a target object. The processor causes replication of the source object to the target object that comprises replicating the current tag with the tag name and the tag value in the source object to the target object. Other embodiments are also described herein.
-
公开(公告)号:US11494513B2
公开(公告)日:2022-11-08
申请号:US17661089
申请日:2022-04-28
Applicant: Snowflake Inc.
Inventor: Artin Avanes , Khalid Zaman Bijon , Zheng Mi , Subramanian Muralidhar , David Schultz , Jian Xu
Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.
-
公开(公告)号:US11347730B1
公开(公告)日:2022-05-31
申请号:US17387632
申请日:2021-07-28
Applicant: Snowflake Inc.
Inventor: Raja Balakrishnan , Khalid Zaman Bijon , Subramanian Muralidhar , David Schultz , Jian Xu
IPC: G06F16/242 , G06F16/23 , G06F16/2453 , G06F16/21 , G06F16/22
Abstract: Aspects of the present disclosure address systems, methods, and devices for tracking object dependencies in a cloud database system. An object dependency created between a referencing object and a referenced object is detected. Based on detecting the object dependency, a dependency record is generated. The dependency record includes dependency information describing the object dependency between the reference object and the referenced object. The dependency record is stored in a database of dependency records.
-
公开(公告)号:US12248448B1
公开(公告)日:2025-03-11
申请号:US18451522
申请日:2023-08-17
Applicant: Snowflake Inc.
IPC: G06F16/215 , G06F11/07 , G06F16/23 , G06F16/2453
Abstract: Provided herein are systems and methods for configuring integrity constraints (including a check constraint) and row violation logging using error tables. An example method includes decoding a query received at a network-based database system. The query includes a command to perform an operation on a base table. An integrity constraint associated with the base table is retrieved. The integrity constraint specifies a desired configuration for the base table. A verification of the integrity constraint is performed to detect erroneous data of the base table that violates the desired configuration. The erroneous data is input into an error table that is configured as a nested object of the base table. A notification that the erroneous data is available in the error table is generated and output.
-
公开(公告)号:US20250061099A1
公开(公告)日:2025-02-20
申请号:US18451522
申请日:2023-08-17
Applicant: Snowflake Inc.
IPC: G06F16/215 , G06F11/07 , G06F16/23 , G06F16/2453
Abstract: Provided herein are systems and methods for configuring integrity constraints (including a check constraint) and row violation logging using error tables. An example method includes decoding a query received at a network-based database system. The query includes a command to perform an operation on a base table. An integrity constraint associated with the base table is retrieved. The integrity constraint specifies a desired configuration for the base table. A verification of the integrity constraint is performed to detect erroneous data of the base table that violates the desired configuration. The erroneous data is input into an error table that is configured as a nested object of the base table. A notification that the erroneous data is available in the error table is generated and output.
-
公开(公告)号:US12105831B2
公开(公告)日:2024-10-01
申请号:US18475403
申请日:2023-09-27
Applicant: Snowflake Inc.
Inventor: Raja Suresh Krishna Balakrishnan , Khalid Zaman Bijon , Subramanian Muralidhar , David Schultz , Jian Xu
CPC classification number: G06F21/6227 , G06F2221/2141
Abstract: Systems and methods for managing column hiding are provided. The systems and methods receive, from a client device, a query associated with a table. The systems and methods determine an access restriction associated with the client device. The systems and methods identify a column of the table that is restricted by the access restriction associated with the client device. In response to identifying the column of the table that is restricted by the access restriction associated with the client device, the systems and methods provide a result of the query that excludes data corresponding to the column.
-
公开(公告)号:US20240281555A1
公开(公告)日:2024-08-22
申请号:US18475403
申请日:2023-09-27
Applicant: Snowflake Inc.
Inventor: Raja Suresh Krishna Balakrishnan , Khalid Zaman Bijon , Subramanian Muralidhar , David Schultz , Jian Xu
IPC: G06F21/62
CPC classification number: G06F21/6227 , G06F2221/2141
Abstract: Systems and methods for managing column hiding are provided. The systems and methods receive, from a client device, a query associated with a table. The systems and methods determine an access restriction associated with the client device. The systems and methods identify a column of the table that is restricted by the access restriction associated with the client device. In response to identifying the column of the table that is restricted by the access restriction associated with the client device, the systems and methods provide a result of the query that excludes data corresponding to the column.
-
公开(公告)号:US11995126B2
公开(公告)日:2024-05-28
申请号:US18104271
申请日:2023-01-31
Applicant: Snowflake Inc.
Inventor: Khalid Zaman Bijon , Thierry Cruanes , Simon Holm Jensen , Allison Waingold Lee , Daniel N. Meredith , Subramanian Muralidhar , David Schultz , Zixi Zhang
IPC: G06F16/903
CPC classification number: G06F16/90335
Abstract: A system for enforcing projection constraints on data values stored in specified variables of a shared dataset of a cloud data platform. A request is received from a first account of the cloud data platform that identifies a first operation to be performed on the shared dataset. A first set of data, including data accessed from a first variable, is accessed from the shared dataset to use in performing the first operation. A projection constraint policy attached to the first variable of the shared dataset is determined, and the projection constraint policy is further determined to be enforced based on the request. Based on the first set of data and the first operation, an output to the first request is generated.
-
公开(公告)号:US20240095393A1
公开(公告)日:2024-03-21
申请号:US18521589
申请日:2023-11-28
Applicant: Snowflake Inc.
Inventor: Artin Avanes , Khalid Zaman Bijon , Zheng Mi , Subramanian Muralidhar , David Schultz , Jian Xu
CPC classification number: G06F21/6227 , G06F16/2282 , G06F21/604 , G06F21/62 , G06F21/6218 , G06F2221/2141
Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.
-
-
-
-
-
-
-
-
-