Patents by Inventor Khalid Zaman Bijon
Khalid Zaman Bijon has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12222949Abstract: A method of implementing object tagging framework starts with the processor receiving a tag creation command including a tag name. In response to the tag creation command, the processor creates a current tag. The processor then receives an association command, the tag name and a source object identifier. The processor determines a source object associated with the source object identifier. The source object includes a tag value. The processor associates the current tag with the source object. The processor receives a replication command including the source object and a target object. The processor causes replication of the source object to the target object that comprises replicating the current tag with the tag name and the tag value in the source object to the target object. Other embodiments are also described herein.Type: GrantFiled: December 19, 2023Date of Patent: February 11, 2025Assignee: Snowflake Inc.Inventors: Artin Avanes, Khalid Zaman Bijon, Yujie Li, Zheng Mi, Subramanian Muralidhar, David Schultz
-
Patent number: 12216662Abstract: A method of implementing object tagging framework starts with the processor receiving a tag creation command including a tag name. In response to the tag creation command, the processor creates a current tag. The processor then receives an association command, the tag name and a target object identifier. The processor determines a target object associated with the target object identifier. The target object includes a tag value. The processor associates the current tag with the target object. The processor identifies a first child object of the target object. The target object and the first child object are hierarchical objects. In response to determining that the first child object is tag-unassociated, the processor associates the current tag with the first child object. In response to receiving a query including the tag name, the processor generates an output based on the tag name. Other embodiments are also described herein.Type: GrantFiled: August 9, 2023Date of Patent: February 4, 2025Assignee: Snowflake Inc.Inventors: Artin Avanes, Khalid Zaman Bijon, Yujie Li, Zheng Mi, Subramanian Muralidhar, David Schultz
-
Publication number: 20250013776Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.Type: ApplicationFiled: September 24, 2024Publication date: January 9, 2025Inventors: Artin Avanes, Khalid Zaman Bijon, Zheng Mi, Subramanian Muralidhar, David Schultz, Jian Xu
-
Publication number: 20240427924Abstract: Systems and methods for managing column hiding are provided. The systems and methods receive, from a client device, a query associated with a table. The systems and methods determine an access restriction associated with the client device. The systems and methods identify a column of the table that is restricted by the access restriction associated with the client device. In response to identifying the column of the table that is restricted by the access restriction associated with the client device, the systems and methods provide a result of the query that excludes data corresponding to the column.Type: ApplicationFiled: September 3, 2024Publication date: December 26, 2024Inventors: Raja Suresh Krishna Balakrishnan, Khalid Zaman Bijon, Subramanian Muralidhar, David Schultz, Jian Xu
-
Patent number: 12169580Abstract: Using container-centric managed access, an administrator is enabled to define a set of future grants for each object that will be created in the future in a container managed by the administrator. When a user creates a database object, the system checks the future grants to determine if any apply to the user, the database object, or the combination. Any applicable future grants are applied to the database object before the user is allowed to modify it. As a result, the administrator is enabled to control the privileges associated with the database object even before the database object is created, while restricting individual object owners from managing privileges on their owned objects.Type: GrantFiled: October 30, 2023Date of Patent: December 17, 2024Assignee: Snowflake Inc.Inventors: Artin Avanes, Khalid Zaman Bijon, Peter Povinec
-
Publication number: 20240378305Abstract: Systems and methods for generating object references with selectable scopes are provided. The systems and methods perform operations including calling, by a first entity, a reference generator function using one or more arguments associated with a database object that the first entity is authorized to access according to a first set of access privileges, the one or more arguments comprising a scope definition that defines persistence of a reference. The operations include obtaining, from the reference generator function, a reference to the database object, the reference persisting according to the scope definition. The operations include passing the reference to a second entity to enable the second entity to perform one or more database operations on the database object according to a second set of access privileges derived from the first set of access privileges.Type: ApplicationFiled: May 12, 2023Publication date: November 14, 2024Inventors: Suraj P. Acharya, Jennifer Wenjun Bi, Khalid Zaman Bijon, Damien Carru, Lin Chan, Tianyi Chen, Jeremy Yujui Chen, Thierry Cruanes, Benoit Dageville, Simon Holm Jensen, Boxin Jiang, Dmitry A. Lychagin, Subramanian Muralidhar, Shuaishuai Nie, Eric Robinson, Sahaj Saini, David Schultz, Kevin Wang, Wenqi Wei, Zixi Zhang, Xingzhe Zhou
-
Patent number: 12135815Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.Type: GrantFiled: November 28, 2023Date of Patent: November 5, 2024Assignee: Snowflake Inc.Inventors: Artin Avanes, Khalid Zaman Bijon, Zheng Mi, Subramanian Muralidhar, David Schultz, Jian Xu
-
Publication number: 20240362355Abstract: A noisy aggregation constraint system receives a query for a shared dataset, where the query identifies an operation. The noisy aggregation constraint system accesses a set of data from the shared dataset to perform the operation, the set of data comprises data accessed from a table of the shared dataset. The system determines that an aggregation constraint policy is attached to the table, the policy restricts output of data values stored in the table. Based on the context of the query, the system determines that the aggregation constraint policy should be enforced in relation to the query. The system assigns a specified noise level to the shared dataset and generates an output based on the set of data and the operation; the output comprises data values added to the table based on the specified noise level.Type: ApplicationFiled: April 26, 2024Publication date: October 31, 2024Inventors: Khalid Zaman Bijon, Monica J. Holboke, Stephen Joe Jonany, David Schultz
-
Publication number: 20240346173Abstract: A shared database platform implements dynamic masking on data shared between users where specific data is masked, transformed, or otherwise modified based on preconfigured functions that are associated with user roles. The shared database platform can implement the masking at runtime dynamically in response to users requesting access to a database object that is associated with one or more masking policies.Type: ApplicationFiled: June 27, 2024Publication date: October 17, 2024Inventors: Artin Avanes, Khalid Zaman Bijon, Damien Carru, Thierry Cruanes, Vikas Jain, Zheng Mi, Subramanian Muralidhar
-
Patent number: 12120189Abstract: Embodiments of the present disclosure may provide a streamlined process for performing operations, such as data sharing and data replication, using multiple accounts. A global identity (also referred to as an organization user) may be employed, where the global identity may have access to multiple accounts across the same or different deployments. The global identity may switch between accounts from its login session and perform various tasks in the context of different accounts without undergoing further authentication.Type: GrantFiled: October 30, 2023Date of Patent: October 15, 2024Assignee: Snowflake Inc.Inventors: Khalid Zaman Bijon, Damien Carru, Christopher Peter Child, Eric Karlson, Zheng Mi
-
Patent number: 12105831Abstract: Systems and methods for managing column hiding are provided. The systems and methods receive, from a client device, a query associated with a table. The systems and methods determine an access restriction associated with the client device. The systems and methods identify a column of the table that is restricted by the access restriction associated with the client device. In response to identifying the column of the table that is restricted by the access restriction associated with the client device, the systems and methods provide a result of the query that excludes data corresponding to the column.Type: GrantFiled: September 27, 2023Date of Patent: October 1, 2024Assignee: Snowflake Inc.Inventors: Raja Suresh Krishna Balakrishnan, Khalid Zaman Bijon, Subramanian Muralidhar, David Schultz, Jian Xu
-
Publication number: 20240303373Abstract: The cloud data platform receives a first query directed towards a shared dataset, the first query identifying a first operation. The platform accesses a first set of data from the shared dataset to perform the first operation, the first set of data including data accessed from a first table of the shared dataset. The cloud data platform determines that an aggregation constraint policy is attached to the first table, the aggregation constraint policy restricts output of data values stored in the first table and enforces the aggregation constraint policy on the first query based on a context of the first query. The cloud data platform generates an output to the first query based on the first set of data and the first operation, based on enforcing the aggregation constraint policy on the first query.Type: ApplicationFiled: June 30, 2023Publication date: September 12, 2024Inventors: Khalid Zaman Bijon, Bowei Chen, Thierry Cruanes, Simon Holm Jensen, Allison Waingold Lee, Valentin K. Kuznetsov, Jun Li, Subramanian Muralidhar, Carl Yates Perry, David Schultz, Zixi Zhang
-
Publication number: 20240281555Abstract: Systems and methods for managing column hiding are provided. The systems and methods receive, from a client device, a query associated with a table. The systems and methods determine an access restriction associated with the client device. The systems and methods identify a column of the table that is restricted by the access restriction associated with the client device. In response to identifying the column of the table that is restricted by the access restriction associated with the client device, the systems and methods provide a result of the query that excludes data corresponding to the column.Type: ApplicationFiled: September 27, 2023Publication date: August 22, 2024Inventors: Raja Suresh Krishna Balakrishnan, Khalid Zaman Bijon, Subramanian Muralidhar, David Schultz, Jian Xu
-
Patent number: 12061717Abstract: A shared database platform implements dynamic masking on data shared between users where specific data is masked, transformed, or otherwise modified based on preconfigured functions that are associated with user roles. The shared database platform can implement the masking at runtime dynamically in response to users requesting access to a database object that is associated with one or more masking policies.Type: GrantFiled: December 7, 2022Date of Patent: August 13, 2024Assignee: Snowflake Inc.Inventors: Artin Avanes, Khalid Zaman Bijon, Damien Carru, Thierry Cruanes, Vikas Jain, Zheng Mi, Subramanian Muralidhar
-
Publication number: 20240176822Abstract: A database system facilitates secure data sharing by implementing projection constraints within a query processing framework. Upon receiving a query directed to a shared dataset, the system, utilizing hardware processors, identifies a subset of data within the dataset that is subject to a projection constraint policy. The applicability of the projection constraint is determined based on the context of the query, which is derived from a data sharing agreement. The system processes the query by selectively restricting the projection of data values from constrained columns, while allowing specific operations to be performed on the data. The output generated in response to the query is compliant with the projection constraint policy, providing derived data based on the allowed operations without revealing the actual data values. This ensures the confidentiality of sensitive information while enabling collaborative data analysis and sharing among various users of the database system.Type: ApplicationFiled: January 31, 2024Publication date: May 30, 2024Inventors: Khalid Zaman Bijon, Thierry Cruanes, Simon Holm Jensen, Allison Waingold Lee, Daniel N. Meredith, Subramanian Muralidhar, David Schultz, Zixi Zhang
-
Patent number: 11995126Abstract: A system for enforcing projection constraints on data values stored in specified variables of a shared dataset of a cloud data platform. A request is received from a first account of the cloud data platform that identifies a first operation to be performed on the shared dataset. A first set of data, including data accessed from a first variable, is accessed from the shared dataset to use in performing the first operation. A projection constraint policy attached to the first variable of the shared dataset is determined, and the projection constraint policy is further determined to be enforced based on the request. Based on the first set of data and the first operation, an output to the first request is generated.Type: GrantFiled: January 31, 2023Date of Patent: May 28, 2024Assignee: Snowflake Inc.Inventors: Khalid Zaman Bijon, Thierry Cruanes, Simon Holm Jensen, Allison Waingold Lee, Daniel N. Meredith, Subramanian Muralidhar, David Schultz, Zixi Zhang
-
Publication number: 20240168946Abstract: Aspects of the present disclosure address systems, methods, and devices for tracking object dependencies in a cloud database system. An object dependency created between a referencing object and a referenced object is detected. Based on detecting the object dependency, a dependency record is generated. The dependency record includes dependency information describing the object dependency between the reference object and the referenced object. The dependency record is stored in a database of dependency records.Type: ApplicationFiled: January 31, 2024Publication date: May 23, 2024Inventors: Raja Suresh Krishna Balakrishnan, Khalid Zaman Bijon, Subramanian Muralidhar, David Schultz, Jian Xu
-
Publication number: 20240119056Abstract: A method of implementing object tagging framework starts with the processor receiving a tag creation command including a tag name. In response to the tag creation command, the processor creates a current tag. The processor then receives an association command, the tag name and a source object identifier. The processor determines a source object associated with the source object identifier. The source object includes a tag value. The processor associates the current tag with the source object. The processor receives a replication command including the source object and a target object. The processor causes replication of the source object to the target object that comprises replicating the current tag with the tag name and the tag value in the source object to the target object. Other embodiments are also described herein.Type: ApplicationFiled: December 19, 2023Publication date: April 11, 2024Inventors: Artin Avanes, Khalid Zaman Bijon, Yujie Li, Zheng Mi, Subramanian Muralidhar, David Schultz
-
Publication number: 20240095393Abstract: Row-level security (RLS) may provide fine-grained access control based on flexible, user-defined access policies to databases, tables, objects, and other data structures. A RLS policy may be an entity or object that defines rules for row access. A RLS policy may be decoupled or independent from any specific table. This allows more robust and flexible control. A RLS policy may then be attached to one or more tables. The RLS policy may include a Boolean-valued expression.Type: ApplicationFiled: November 28, 2023Publication date: March 21, 2024Inventors: Artin Avanes, Khalid Zaman Bijon, Zheng Mi, Subramanian Muralidhar, David Schultz, Jian Xu
-
Patent number: 11934543Abstract: Systems and methods for generating transient object references are provided. The systems and methods perform operations including establishing a session between a first entity and a second entity. The operations include identifying an object that the first entity is authorized to access according to a first set of access privileges. The operations include generating a reference associated with the object. The operations include temporarily authorizing the second entity to access the object using the reference according to a second set of access privileges, the second set of access privileges being derived from the first set of access privileges.Type: GrantFiled: November 17, 2022Date of Patent: March 19, 2024Assignee: Snowflake Inc.Inventors: Jennifer Wenjun Bi, Khalid Zaman Bijon, Damien Carru, Thierry Cruanes, Simon Holm Jensen, Daniel N. Meredith, Subramanian Muralidhar, Eric Robinson, David Schultz, Zixi Zhang