Systems and methods for verifying performance of a modification request in a database system

    公开(公告)号:US11151088B2

    公开(公告)日:2021-10-19

    申请号:US16530036

    申请日:2019-08-02

    Abstract: Provided are systems and methods for verifying, in a database system, that a modification request to events data is completed. The method marks a modification request as verifying and implements a search strategy to search for unmodified events data (the stragglers) in the least expensive query scope first and then keep expanding the scope of the query until at least one unmodified events data is found (a straggler), which is marked as a fail. This strategy includes (i) beginning at a lowest scope search, (ii) searching a (database first: continuing to expand the search scope as high as it can go without a fail, and (iii) only when it's finished searching the database without a fail, searching a search engine in the same way. When the searches are done, and no fails have been marked, the method marks the request as done.

    SYSTEMS AND METHODS FOR VERIFYING PERFORMANCE OF A MODIFICATION REQUEST IN A DATABASE SYSTEM

    公开(公告)号:US20210034574A1

    公开(公告)日:2021-02-04

    申请号:US16530036

    申请日:2019-08-02

    Abstract: Provided are systems and methods for verifying, in a database system, that a modification request to events data is completed. The method marks a modification request as verifying and implements a search strategy to search for unmodified events data (the stragglers) in the least expensive query scope first and then keep expanding the scope of the query until at least one unmodified events data is found (a straggler), which is marked as a fail. This strategy includes (i) beginning at a lowest scope search, (ii) searching a (database first: continuing to expand the search scope as high as it can go without a fail, and (iii) only when it's finished searching the database without a fail, searching a search engine in the same way. When the searches are done, and no fails have been marked, the method marks the request as done.

    CENTRALLY ROTATING PRIVATE/PUBLIC ENCRYPTION KEYS IN A LARGE SCALE SYSTEM

    公开(公告)号:US20230179413A1

    公开(公告)日:2023-06-08

    申请号:US17457386

    申请日:2021-12-02

    CPC classification number: H04L9/0891 H04L9/0894 H04L9/14

    Abstract: A system and method for rotating private encryption keys for tenants of a database system has been developed. First, three separate public-private encryption keys are generated for a tenant of the database system. The three separate private encryption keys for the tenant are then stored in cloud-based storage. A defined cadence is created to rotate the private encryption keys for the tenant. The three separate private encryption keys for the tenant are defined as a a past private key, a present private key and a future private key. Next, the public encryption key is stored for the tenant in a global tenant directory. The present private key and the public encryption key are retrieved to encrypt and decrypt data from the tenant. The three separate private encryption keys are rotated at the defined cadence, where the past private key is discarded, the present private key becomes a new past private key, the future private key becomes a new present private key, and a new future private key is generated. The new past private key, the new present private key and the new future private key for the tenant are then stored in cloud-based storage.

    Techniques and Architectures for Providing Transactional Stateful Data Protection Deletion Functionality

    公开(公告)号:US20220237172A1

    公开(公告)日:2022-07-28

    申请号:US17156442

    申请日:2021-01-22

    Abstract: Techniques and mechanisms to manage deletions from data tables are disclosed. A request to delete data from at least one data table in an environment having tables storing data from multiple disparate sources is received. The environment can also have a delete request status table and a notification table. Processing of the delete request is managed utilizing a multi-stage workflow where stages of the multistage workflow are tracked by updating entries to the delete request status table. Completion of the delete request is verified by checking at least one entry in the delete request status table corresponding to the delete request. A corresponding entry is written to the notification table in response to a successful verified completion of the delete request.

    Metric determination for an interaction data stream using multiple databases

    公开(公告)号:US11138204B2

    公开(公告)日:2021-10-05

    申请号:US16530680

    申请日:2019-08-02

    Abstract: Techniques are disclosed for generating metrics for a stream of interaction data. In some embodiments, a computing system receives a stream of interaction data that is based on user interactions with one or more computing systems, where the stream of interaction data includes information for multiple interaction characteristics including an interaction category. In response to receiving additional interaction information in the stream of interaction data, the computing system may generate cumulative metric values for one or more interaction categories. Generating cumulative metric values may include: sharding the additional interaction information based on multiple characteristics including interaction category, storing the sharded information in a non-relational database, determining respective metric values for shards modified by the storing, storing the respective metric values and shard information for each of the modified shards in a relational database, querying the relational database using one or more interaction categories corresponding to the modified shards, and determining the cumulative metric values based on the results of the querying.

    METRIC DETERMINATION FOR AN INTERACTION DATA STREAM USING MULTIPLE DATABASES

    公开(公告)号:US20210034627A1

    公开(公告)日:2021-02-04

    申请号:US16530680

    申请日:2019-08-02

    Abstract: Techniques are disclosed for generating metrics for a stream of interaction data. In some embodiments, a computing system receives a stream of interaction data that is based on user interactions with one or more computing systems, where the stream of interaction data includes information for multiple interaction characteristics including an interaction category. In response to receiving additional interaction information in the stream of interaction data, the computing system may generate cumulative metric values for one or more interaction categories. Generating cumulative metric values may include: sharding the additional interaction information based on multiple characteristics including interaction category, storing the sharded information in a non-relational database, determining respective metric values for shards modified by the storing, storing the respective metric values and shard information for each of the modified shards in a relational database, querying the relational database using one or more interaction categories corresponding to the modified shards, and determining the cumulative metric values based on the results of the querying.

Patent Agency Ranking