COLUMN HIDING MANAGEMENT SYSTEM
    1.
    发明申请

    公开(公告)号:US20240427924A1

    公开(公告)日:2024-12-26

    申请号:US18823014

    申请日:2024-09-03

    Applicant: Snowflake Inc.

    Abstract: Systems and methods for managing column hiding are provided. The systems and methods receive, from a client device, a query associated with a table. The systems and methods determine an access restriction associated with the client device. The systems and methods identify a column of the table that is restricted by the access restriction associated with the client device. In response to identifying the column of the table that is restricted by the access restriction associated with the client device, the systems and methods provide a result of the query that excludes data corresponding to the column.

    NESTED ROW ACCESS POLICIES
    2.
    发明申请

    公开(公告)号:US20240419828A1

    公开(公告)日:2024-12-19

    申请号:US18394531

    申请日:2023-12-22

    Applicant: Snowflake Inc.

    Abstract: Methods of referencing row access policy (RAP) protected mapping tables in a RAP for a data table are disclosed herein. An example method of referencing a mapping table in a data table using nested RAP includes defining, by a processing device, a first access policy for the mapping table to control access by specific users or under specific conditions. The processing device further defines a second access policy attached to the data table referencing the mapping table. The processing device in response to a query, executes the second access policy of the data table to provide a response or operation of data associated with the data table and the mapping table. Executing the second access policy invokes executing the first access policy of the mapping table. The executing of both the second access policy of the data table and the first access policy of the mapping table are recorded.

    BUILT-IN DATA QUALITY MONITORING
    3.
    发明申请

    公开(公告)号:US20240403276A1

    公开(公告)日:2024-12-05

    申请号:US18326158

    申请日:2023-05-31

    Applicant: Snowflake Inc.

    Abstract: Described herein are techniques for data quality monitoring in a network-based data system. A data metric function used to evaluate data quality can be stored, where the data metric function is defined as schema level object. The data metric function can be attached to a table associated with an account and is evaluated on data associates with the table to generate evaluation results. The evaluation results can be stored in an account-specific central database, from which access is provided to the evaluation results to a user for the account.

    ROW-LEVEL SECURITY
    9.
    发明申请

    公开(公告)号:US20230022027A1

    公开(公告)日:2023-01-26

    申请号:US17936681

    申请日:2022-09-29

    Applicant: Snowflake Inc.

    Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.

    Nested row access policies
    10.
    发明授权

    公开(公告)号:US12259991B2

    公开(公告)日:2025-03-25

    申请号:US18394531

    申请日:2023-12-22

    Applicant: Snowflake Inc.

    Abstract: Methods of referencing row access policy (RAP) protected mapping tables in a RAP for a data table are disclosed herein. An example method of referencing a mapping table in a data table using nested RAP includes defining, by a processing device, a first access policy for the mapping table to control access by specific users or under specific conditions. The processing device further defines a second access policy attached to the data table referencing the mapping table. The processing device in response to a query, executes the second access policy of the data table to provide a response or operation of data associated with the data table and the mapping table. Executing the second access policy invokes executing the first access policy of the mapping table. The executing of both the second access policy of the data table and the first access policy of the mapping table are recorded.

Patent Agency Ranking